File Download Via Bitsadmin To A Suspicious Target Folder

Detects usage of bitsadmin downloading a file to a suspicious target folder

Sigma rule (View on GitHub)

 1title: File Download Via Bitsadmin To A Suspicious Target Folder
 2id: 2ddef153-167b-4e89-86b6-757a9e65dcac
 3status: test
 4description: Detects usage of bitsadmin downloading a file to a suspicious target folder
 5references:
 6    - https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin
 7    - https://isc.sans.edu/diary/22264
 8    - https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/
 9    - https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/
10author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
11date: 2022-06-28
12modified: 2023-05-30
13tags:
14    - attack.defense-evasion
15    - attack.persistence
16    - attack.t1197
17    - attack.s0190
18    - attack.t1036.003
19logsource:
20    category: process_creation
21    product: windows
22detection:
23    selection_img:
24        - Image|endswith: '\bitsadmin.exe'
25        - OriginalFileName: 'bitsadmin.exe'
26    selection_flags:
27        CommandLine|contains:
28            - ' /transfer '
29            - ' /create '
30            - ' /addfile '
31    selection_folder:
32        CommandLine|contains:
33            - ':\Perflogs'
34            - ':\ProgramData\'
35            - ':\Temp\'
36            - ':\Users\Public\'
37            - ':\Windows\'
38            - '\AppData\Local\Temp\'
39            - '\AppData\Roaming\'
40            - '\Desktop\'
41            - '%ProgramData%'
42            - '%public%'
43    condition: all of selection_*
44falsepositives:
45    - Unknown
46level: high

References

Related rules

to-top