heroui logo

Suspicious Download From File-Sharing Website Via Bitsadmin

Sigma Rules

View Source
Summary
The rule detects potentially malicious activity involving the use of Bitsadmin, a command-line tool in Windows, to download files from suspicious domains. Bitsadmin can be leveraged by attackers for nefarious purposes, particularly in the context of file-sharing websites that may host malware or unwanted payloads. The detection logic focuses on identifying command-line operations that include references to Bitsadmin along with known file-sharing domain patterns. It inspects the creation of processes related to Bitsadmin, checking if the command line contains specific flags typically used for file downloads. This includes observing certain command-line arguments linked to file transfers, while also keeping an eye on the `Image` and `OriginalFileName` metadata for validation. Given the evolving tactics of cyber threats, particularly in the realm of ransomware and various exploitation strategies, this rule remains crucial in monitoring and flagging irregular download activities that could lead to system compromise.
Categories
  • Windows
  • Network
  • Cloud
Data Sources
  • Process
Created: 2022-06-28