
Summary
This analytic rule detects the use of BITSAdmin (`bitsadmin.exe`) with the `transfer` parameter, a command that can download remote objects, as a potential indicator of malicious activity. The rule utilizes telemetry data from Endpoint Detection and Response (EDR) systems to monitor processes, particularly focusing on process creation events and command-line arguments. The BITSAdmin tool, while legitimate in purpose, can be exploited by threat actors to illicitly download and execute malware without being easily detected, especially when set to download files via command-line parameters like `transfer` or `addfile`. This detection strategy emphasizes the importance of reviewing associated processes that may spawn from BITSAdmin, particularly instances of `svchost.exe`, to identify any coordinated malicious activities. The recommendation is to scrutinize command-line arguments and related process trees to ascertain the legitimacy of the download activities, thus enabling a proactive response to potential threats.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1105
- T1197
Created: 2024-11-13