Question : Virus Attack on Domain - Event ID 12294 (SAM) & Event ID 644, 675 = Net-Worm.Win32.Kido

Hi all

We've got a virus problem since today morning in our domain:

Most of the time the administrator account are attacked. But here the main events:


Event ID 644:
User Account Locked Out:
       Target Account Name:      mha
       Target Account ID:      mydomain\mha
       Caller Machine Name:      WST187
       Caller User Name:      SERVER-A01$
       Caller Domain:      mydomain
       Caller Logon ID:      (0x0,0x3E7)


and:
Pre-authentication failed:
       User Name:      mha
       User ID:            mydomain\mha
       Service Name:      krbtgt/mydomain
       Pre-Authentication Type:      0x2
       Failure Code:      0x12
       Client Address:   ip

Event ID: 12294   (got TONS of this error)
The SAM database was unable to lockout the account of Administrator due to a resource error, such as a hard disk write failure (the specific error code is in the error data) . Accounts are locked after a certain number of bad passwords are provided so please consider resetting the password of the account mentioned above.



This Domain has about 100 workstations connected. All (most..) of them are using Kaspersky Scanner installed, are WSUS patched and just User rights.

However, somehow we have now a big mess because of this:

>>> Net-Worm.Win32.Kido.ix <<<

Some machines we found with this and removed it with an special tool from kaspersky.
But there are still some in the "wild" here.

What is the best way to track down what machines the attacks come from??
How i can use the event logging to track it down?

please help!

thank you!!

BTW; The domain servers (2) seems to be never infected at all - at least not the OS parts.
just on some data shares we've found the "autorun.inf" - Autorun is disabled by gpo in our domain.

Answer : Virus Attack on Domain - Event ID 12294 (SAM) & Event ID 644, 675 = Net-Worm.Win32.Kido

Random Solutions  
 
programming4us programming4us