Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Odd Entries in Security Logs of Event Viewer - Infection or Windows 8 Oddity?


  • This topic is locked This topic is locked
7 replies to this topic

#1 windows8newb

windows8newb

  • Members
  • 140 posts
  • OFFLINE
  •  
  • Local time:04:34 AM

Posted 11 August 2014 - 12:39 PM

Hi all, and thanks in advance.

 

I have a new Windows 8.1 Dell laptop (one week old).  Windows is fully updated, as is Firefox (with NoScript and Web of Trust), Avast! free, and Malwarebytes.  I have not used Windows 8 before so I am not sure what is normal.  The computer runs fine, but I need to use my computer for sensitive financial information on occasion, so I need to be sure.

 

One odd event yesterday had me digging in the event viewer.  I found 2 types of events that unsettled me.

 

1)  I was playing a game when the screen flashed black, twice.  I have only integrated graphics, but this is not a graphically intensive game (Dungeon Crawl, if you know it). I checked my graphics drivers and they are up to date.  A look at the event viewer revealed three items in the security log: a blank password query followed by a logon and then a special logon.

 

I have copied and pasted them, separated by "---".  There was a lot of code after each event that I haven't posted to save space; also, I've "XXXXX"ed out the name of the computer and the account.

 

 

Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          8/10/2014 1:14:13 PM
Event ID:      4797
Task Category: User Account Management
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      XXXXXXXXXX
Description:
An attempt was made to query the existence of a blank password for an account.

Subject:
    Security ID:        XXXXXXXXXX
    Account Name:        XXXXXXXXXX
    Account Domain:        XXXXXXXXXX
    Logon ID:        0x12774C

Additional Information:
    Caller Workstation:    XXXXXXXXXX
    Target Account Name:    Administrator
    Target Account Domain:    XXXXXXXXXX

 

---

 

Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          8/10/2014 1:15:10 PM
Event ID:      4624
Task Category: Logon
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      XXXXXXXXXX
Description:
An account was successfully logged on.

Subject:
    Security ID:        S-1-5-18
    Account Name:        XXXXXXXXXX$
    Account Domain:        WORKGROUP
    Logon ID:        0x3E7

Logon Type:            5

Impersonation Level:        Impersonation

New Logon:
    Security ID:        S-1-5-18
    Account Name:        SYSTEM
    Account Domain:        NT AUTHORITY
    Logon ID:        0x3E7
    Logon GUID:        {00000000-0000-0000-0000-000000000000}

Process Information:
    Process ID:        0x340
    Process Name:        C:\Windows\System32\services.exe

Network Information:
    Workstation Name:    
    Source Network Address:    -
    Source Port:        -

Detailed Authentication Information:
    Logon Process:        Advapi  
    Authentication Package:    Negotiate
    Transited Services:    -
    Package Name (NTLM only):    -
    Key Length:        0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.
    - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
    - Transited services indicate which intermediate services have participated in this logon request.
    - Package name indicates which sub-protocol was used among the NTLM protocols.
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

 

---

 

Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          8/10/2014 1:15:10 PM
Event ID:      4672
Task Category: Special Logon
Level:         Information
Keywords:      Audit Success
User:          N/A
Computer:      XXXXXXXXXX
Description:
Special privileges assigned to new logon.

Subject:
    Security ID:        SYSTEM
    Account Name:        SYSTEM
    Account Domain:        NT AUTHORITY
    Logon ID:        0x3E7

Privileges:        SeAssignPrimaryTokenPrivilege
            SeTcbPrivilege
            SeSecurityPrivilege
            SeTakeOwnershipPrivilege
            SeLoadDriverPrivilege
            SeBackupPrivilege
            SeRestorePrivilege
            SeDebugPrivilege
            SeAuditPrivilege
            SeSystemEnvironmentPrivilege
            SeImpersonatePrivilege
 

---

 

2)  Looking through the log, I get dozens if not hundreds of these "Attempt was made to query a blank password" events each day; even if I am in airplane mode.  Google searches only yield other people who have them and don't know why, but also feel uneasy.  They target every account on the system. 

 

Note:  At first I was unaware of the existence of the built-in "Administrator" account, so it probably did have a blank password, which was the account targeted for a blank password at the time that the screen flashed black.  That account has now been disabled. 

 

I ran Avast! boot scan, Malwarebytes, Malwarebytes Anti-Rootkit, and the on demand tool Microsoft Safety Scanner.  All say it is totally clean.  I just wanted a second opinion.

 

Thanks much!

 

EDIT for a bit of background on the machine:  the first day I got it, I had the trail McAfee on and I went to download Avast!  McAfee flagged the .exe as a trojan, even though it said Avast!  I then found that I had AVG instead of Avast!; I don't know if I misclicked or anything.  Even though it seemed to be the actual legit AVG, I was disturbed by this and did a system "refresh" on my Windows 8.1, got Firefox and Avast! and Malwarebytes, after which is where my post picks up.


Edited by windows8newb, 11 August 2014 - 05:21 PM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,166 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:34 AM

Posted 13 August 2014 - 07:53 PM

See the post here http://social.technet.microsoft.com/Forums/windows/en-US/e6db8fba-c2c8-47be-a992-96e383e34693/windows-8-event-id-4797-in-security-log
The last post states its not malware.

You may want to ask in Win8 if they have more info.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 windows8newb

windows8newb
  • Topic Starter

  • Members
  • 140 posts
  • OFFLINE
  •  
  • Local time:04:34 AM

Posted 14 August 2014 - 11:17 AM

Thanks for the reply, boopme!

 

Since I do plan to use this computer for sensitive financial information, would it be possible for someone to walk me through some scans to make sure the computer is fine and nothing got infected during setup? (Since I'm not very computer savvy and I did choose to refresh from a recovery partition after McAfee said it detected a trojan the first time.)

 

Or, if the refresh was sufficient, and all the clean scans I've done since then (Malwarebytes, Malwarebytes anti-rootkit, and Avast!) are sufficient to provide a clean bill of health, just let me know that and I'll be off to enjoy my new computer :)

 

Thanks!



#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,166 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:34 AM

Posted 14 August 2014 - 08:51 PM

Yes post a new topic, titled Am I Clean...we'll take a deep look.

Include this link back here
http://www.bleepingcomputer.com/forums/t/544054/odd-entries-in-security-logs-of-event-viewer-infection-or-windows-8-oddity/#entry3448091

Please follow the instructions in THIS GUIDE starting at Step 6. If you cannot complete a step, skip it and continue.
Once the proper logs are created, then make a NEW TOPIC and post it HERE. Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.
If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.
It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.
If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 windows8newb

windows8newb
  • Topic Starter

  • Members
  • 140 posts
  • OFFLINE
  •  
  • Local time:04:34 AM

Posted 14 August 2014 - 09:17 PM

Boopme, thank you so much for working with me to give me peace of mind.  One other symptom that has been bothering me is that randomly the computer will switch to "Limited" for my Wi-Fi or will fail to recognize any network, even though the driver is up to date.  So, a deeper look is good for my sanity.

 

When I try to run DDS, it says,

 

"DDS is not meant to run in 'Compatibility Mode'.

The program shall now exit."

 

I have Windows 8.1.



#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,166 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:34 AM

Posted 14 August 2014 - 09:26 PM

:oopsign: Win8 wont work with DDS.. Just start the topic and state you have win 8.. We will use other tools.

 

You are most welcome!!


Edited by boopme, 14 August 2014 - 09:26 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 windows8newb

windows8newb
  • Topic Starter

  • Members
  • 140 posts
  • OFFLINE
  •  
  • Local time:04:34 AM

Posted 14 August 2014 - 09:33 PM

Thank you, it has been posted.  Thanks so much.

 

http://www.bleepingcomputer.com/forums/t/544462/am-i-clean/



#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,166 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:34 AM

Posted 14 August 2014 - 09:46 PM

Cool !!
 
Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.
From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.
Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.
The current wait time is 1 - 5 days and ALL logs are answered.
If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.
To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users