New BITS Job Created Via Bitsadmin
Detects the creation of a new bits job by Bitsadmin
Sigma rule (View on GitHub)
1title: New BITS Job Created Via Bitsadmin
2id: 1ff315dc-2a3a-4b71-8dde-873818d25d39
3status: test
4description: Detects the creation of a new bits job by Bitsadmin
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md
7author: frack113
8date: 2022-03-01
9modified: 2023-03-27
10tags:
11 - attack.defense-evasion
12 - attack.persistence
13 - attack.t1197
14logsource:
15 product: windows
16 service: bits-client
17detection:
18 selection:
19 EventID: 3
20 processPath|endswith: '\bitsadmin.exe'
21 condition: selection
22falsepositives:
23 - Many legitimate applications or scripts could leverage "bitsadmin". This event is best correlated with EID 16403 via the JobID field
24level: low
References
Related rules
- BITS Transfer Job Download From Direct IP
- BITS Transfer Job Download To Potential Suspicious Folder
- BITS Transfer Job Downloading File Potential Suspicious Extension
- BITS Transfer Job With Uncommon Or Suspicious Remote TLD
- Bitsadmin to Uncommon IP Server Address