Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NTFS Alternative data stream found in a folder when it has the archiving attribute #758

Open
elvarb opened this issue Mar 4, 2016 · 3 comments

Comments

@elvarb
Copy link

elvarb commented Mar 4, 2016

OSSEC HIDS reports this

OSSEC HIDS Notification.
2016 Mar 04 09:06:00

Received From: (elvarx1) any->rootcheck
Rule: 510 fired (level 7) -> "Host-based anomaly detection event (rootcheck)."
Portion of the log(s):

NTFS Alternate data stream found: 'C:\Program Files/7-Zip:Win32App_1'. Possible hidden content.

In this and a few other folders.

I have confirmed that no alternative data streams are set with

gci -recurse | % { gi $_.FullName -stream * } | where stream -ne ':$Data'

The folders that OSSEC HIDS find have the same thing in common, they have the "a" attribute set to them.

PS C:\Program Files> get-item .\7-Zip\ | select mode

Mode
----
da----

This can be seen also in the properties for the folder under advanced, there "Folder is ready for archiving" is ticked.

Is this a bug in the client? and if so, is it properly tracking alternative data streams at all?

@infolookup
Copy link

Was this ever resolved or just chalk it up to a false positive? I am seeing the same thing as well.

@elvarb
Copy link
Author

elvarb commented Aug 8, 2017

@dougburks definitely the same, very strange that this is being created constantly. So the real question should be, how can we weed out those valid streams from the scans?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants