Our last step in our active directory migration takes place this weekend, and I received a call at 1:30 am from the New Orleans location doing the migration saying that they appear to be having trouble hitting our domain controllers due to excessive network traffic. Consultant handling the migration indicates that he had first run into a problem with a machine at our Bakersfield, CA. location that was sending repeated logon attempts to our domain controllers. The consultant remotes in to the machine in question, finds the culprit is a process called "winsit.exe", shuts it down, and things quiet down. Approximately half an hour later, the same machine starts the process all over again. This time he remotes in and shuts the machine off.
Shortly thereafter, another pc, this time at our OK City location begins the same thing. Then three minutes later, a machine in an Electra, TX location starts. Approximately 45 minutes later, a machine in New Iberia, LA. All of them have this same process running. That's when they called me (lucky me, eh?).
A check of the security logs reveals that the machines in question are sending logon requests to the dcs, attempting to access a variety of standard administrative accounts (in several languages and permutations) at the rate of eight hits per second.
Managed to either shut off all the machines, or close their site to site tunnels to eliminate the traffic to the domain controllers.
Can find no reference to this process anywhere on NAI, Symantec, Trend, or any of the typical security sites. The closest thing I have been able to find is a reference to a "winset.ini" process related to a "W32.HLLP.Spreda.B" virus.
I am hoping that the description I received was in error and that it was actually this virus that he was trying to describe, but am beginning to doubt it. The symptoms just don't quite match up.
Has anyone had any similar incident recently that might indicate a new virus or worm in the wild?
(I am NOT looking forward to going back in to work Monday!)
Any input would be appreciated.
"The Crystal Wind is the storm, and the storm is data, and the data is life. You have been slaves, denied the storm, denied the freedom of your data. That is now ended; the whirlwind is upon you . . . . . . Whether you like it or not."
"Trent the Uncatchable" in The Long Run by Daniel Keys Moran
Shortly thereafter, another pc, this time at our OK City location begins the same thing. Then three minutes later, a machine in an Electra, TX location starts. Approximately 45 minutes later, a machine in New Iberia, LA. All of them have this same process running. That's when they called me (lucky me, eh?).
A check of the security logs reveals that the machines in question are sending logon requests to the dcs, attempting to access a variety of standard administrative accounts (in several languages and permutations) at the rate of eight hits per second.
Managed to either shut off all the machines, or close their site to site tunnels to eliminate the traffic to the domain controllers.
Can find no reference to this process anywhere on NAI, Symantec, Trend, or any of the typical security sites. The closest thing I have been able to find is a reference to a "winset.ini" process related to a "W32.HLLP.Spreda.B" virus.
I am hoping that the description I received was in error and that it was actually this virus that he was trying to describe, but am beginning to doubt it. The symptoms just don't quite match up.
Has anyone had any similar incident recently that might indicate a new virus or worm in the wild?
(I am NOT looking forward to going back in to work Monday!)
Any input would be appreciated.
"The Crystal Wind is the storm, and the storm is data, and the data is life. You have been slaves, denied the storm, denied the freedom of your data. That is now ended; the whirlwind is upon you . . . . . . Whether you like it or not."
"Trent the Uncatchable" in The Long Run by Daniel Keys Moran