File Download Via Bitsadmin
Detects usage of bitsadmin downloading a file
Sigma rule (View on GitHub)
1title: File Download Via Bitsadmin
2id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
3status: test
4description: Detects usage of bitsadmin downloading a file
5references:
6 - https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin
7 - https://isc.sans.edu/diary/22264
8 - https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/
9author: Michael Haag, FPT.EagleEye
10date: 2017-03-09
11modified: 2023-02-15
12tags:
13 - attack.defense-evasion
14 - attack.persistence
15 - attack.t1197
16 - attack.s0190
17 - attack.t1036.003
18 - attack.command-and-control
19 - attack.t1105
20logsource:
21 category: process_creation
22 product: windows
23detection:
24 selection_img:
25 - Image|endswith: '\bitsadmin.exe'
26 - OriginalFileName: 'bitsadmin.exe'
27 selection_cmd:
28 CommandLine|contains: ' /transfer '
29 selection_cli_1:
30 CommandLine|contains:
31 - ' /create '
32 - ' /addfile '
33 selection_cli_2:
34 CommandLine|contains: 'http'
35 condition: selection_img and (selection_cmd or all of selection_cli_*)
36falsepositives:
37 - Some legitimate apps use this, but limited.
38level: medium
39regression_tests_path: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download/info.yml
40simulation:
41 - type: atomic-red-team
42 name: Windows - BITSAdmin BITS Download
43 technique: T1105
44 atomic_guid: a1921cd3-9a2d-47d5-a891-f1d0f2a7a31b
References
Related rules
- File Download Via Bitsadmin To A Suspicious Target Folder
- File With Suspicious Extension Downloaded Via Bitsadmin
- Suspicious Download From File-Sharing Website Via Bitsadmin
- Suspicious Download From Direct IP Via Bitsadmin
- Bitsadmin to Uncommon TLD