heroui logo

Office Product Spawning BITSAdmin

Splunk Security Content

View Source
Summary
The detection rule titled "Office Product Spawning BITSAdmin" identifies instances where a Windows Office application (such as Word, Excel, PowerPoint, etc.) spawns the process `bitsadmin.exe`. This behavior is notorious for being linked to malware families, primarily due to `bitsadmin.exe`'s capability to facilitate data transfers in the background, often exploited by threat actors to download additional malicious payloads without direct user consent. The rule leverages data from Endpoint Detection and Response (EDR) systems, specifically monitoring the relationships between processes and their parent processes. Such activity might suggest a malware infection, warranting further investigation into potential threats and compromise on the affected system.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1197
  • T1566
  • T1566.001
Created: 2025-01-13