There are several odd services running on a system that we suspect has been compromised. Whatever is on the system is avoiding detection by MS and by Sophos and other scanning software, but it is attempting user credentials at odd times and then locking out the user accounts (random accounts on our domain).
For example: DCPUserSVC_(then numbers and letters that vary). This service is running C:\windows\system32\svchost.exe -k UnistackSvcGroup
I cannot see a reason for this service to exist, let alone 3 of them with different trailing information after the underscore.
The same is true for:
Contact Data_(the same set for 3 services)
Sync Host_
User Data Access_
Windows Push Notifications User Service_
All of these seem part of an infection of some sort. We have isolated the systems, but I want to know what these are and why they are avoiding detection by any known scanning engine. I firmly believe they reside on the systems as part of a systemic approach to gather data and infiltrate our infrastructure. The fact they are attempting user credentials for accounts against domain controllers is, to me, a clear sign they are malicious.
Thoughts?