BITS Transfer Job Download To Potential Suspicious Folder
Detects new BITS transfer job where the LocalName/Saved file is stored in a potentially suspicious location
Sigma rule (View on GitHub)
1title: BITS Transfer Job Download To Potential Suspicious Folder
2id: f8a56cb7-a363-44ed-a82f-5926bb44cd05
3status: test
4description: Detects new BITS transfer job where the LocalName/Saved file is stored in a potentially suspicious location
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md
7author: Florian Roth (Nextron Systems)
8date: 2022-06-28
9modified: 2023-03-27
10tags:
11 - attack.defense-evasion
12 - attack.persistence
13 - attack.t1197
14logsource:
15 product: windows
16 service: bits-client
17detection:
18 selection:
19 EventID: 16403
20 LocalName|contains:
21 # TODO: Add more interesting suspicious paths
22 - '\Desktop\'
23 - 'C:\Users\Public\'
24 - 'C:\PerfLogs\'
25 condition: selection
26falsepositives:
27 - Unknown
28level: high
References
Related rules
- BITS Transfer Job Download From Direct IP
- BITS Transfer Job Downloading File Potential Suspicious Extension
- BITS Transfer Job With Uncommon Or Suspicious Remote TLD
- Bitsadmin to Uncommon IP Server Address
- Bitsadmin to Uncommon TLD