BITSAdmin Downloading Malicious Binaries
It is not unusual for adversaries, including ones who peddle ransomware, to use BITSAdmin to download arbitrary files from the internet in an effort to evade application blocklisting. The following analytic will look for the execution of bitsadmin.exe with command options that suggest a file is being downloaded. Part of the RedCanary 2024 Threat Detection Report.
Sigma rule (View on GitHub)
1title: BITSAdmin Downloading Malicious Binaries
2id: b195646e-8455-4fa1-b78a-91bb92371152
3status: experimental
4description: |
5 It is not unusual for adversaries, including ones who peddle ransomware, to use
6 BITSAdmin to download arbitrary files from the internet in an effort to evade
7 application blocklisting. The following analytic will look for the execution of
8 bitsadmin.exe with command options that suggest a file is being downloaded. Part
9 of the RedCanary 2024 Threat Detection Report.
10references:
11 - https://redcanary.com/threat-detection-report/techniques/ingress-tool-transfer/
12author: RedCanary, Sigma formatting by Micah Babinski
13date: 2024/03/21
14tags:
15 - attack.command_and_control
16 - attack.t1105
17logsource:
18 category: process_creation
19 product: windows
20detection:
21 selection:
22 Image|endswith: '\bitsadmin.exe'
23 CommandLine|contains:
24 - 'download'
25 - 'transfer'
26 condition: selection
27falsepositives:
28 - Unknown
29level: low```
References
Related rules
- CertUtil Downloading Malicious Binaries
- Certreq Downloading Malicious Binaries
- Operator Bring Your Own Tools
- Autoit3.exe Executable File Creation Matching DarkGate Behavior
- BITSAdmin Downloading Malicious Binaries (RedCanary Threat Detection Report)