File Download Via Bitsadmin To A Suspicious Target Folder

Detects usage of bitsadmin downloading a file to a suspicious target folder

Sigma rule (View on GitHub)

 1title: File Download Via Bitsadmin To A Suspicious Target Folder
 2id: 2ddef153-167b-4e89-86b6-757a9e65dcac
 3related:
 4    - id: 6e30c82f-a9f8-4aab-b79c-7c12bce6f248
 5      type: obsolete
 6    - id: 1cf465a1-2609-4c15-9b66-c32dbe4bfd67
 7      type: similar
 8status: test
 9description: Detects usage of bitsadmin downloading a file to a suspicious target folder
10references:
11    - https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin
12    - https://isc.sans.edu/diary/22264
13    - https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/
14    - https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/
15author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
16date: 2022-06-28
17modified: 2025-12-10
18tags:
19    - attack.defense-evasion
20    - attack.persistence
21    - attack.t1197
22    - attack.s0190
23    - attack.t1036.003
24    - attack.command-and-control
25    - attack.t1105
26logsource:
27    category: process_creation
28    product: windows
29detection:
30    selection_img:
31        - Image|endswith: '\bitsadmin.exe'
32        - OriginalFileName: 'bitsadmin.exe'
33    selection_flags:
34        CommandLine|contains:
35            - ' /transfer '
36            - ' /create '
37            - ' /addfile '
38    selection_folder:
39        CommandLine|contains:
40            - ':\Perflogs'
41            - ':\ProgramData\'
42            - ':\Temp\'
43            - ':\Users\Public\'
44            - ':\Windows\'
45            - '\$Recycle.Bin\'
46            - '\AppData\Local\'
47            - '\AppData\Roaming\'
48            - '\Contacts\'
49            - '\Desktop\'
50            - '\Favorites\'
51            - '\Favourites\'
52            - '\inetpub\wwwroot\'
53            - '\Music\'
54            - '\Pictures\'
55            - '\Start Menu\Programs\Startup\'
56            - '\Users\Default\'
57            - '\Videos\'
58            - '%ProgramData%'
59            - '%public%'
60            - '%temp%'
61            - '%tmp%'
62    condition: all of selection_*
63falsepositives:
64    - Unknown
65level: high
66regression_tests_path: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder/info.yml
67simulation:
68    - type: atomic-red-team
69      name: Windows - BITSAdmin BITS Download
70      technique: T1105
71      atomic_guid: a1921cd3-9a2d-47d5-a891-f1d0f2a7a31b

References

Related rules

to-top