
Summary
This detection rule identifies the use of the 'bitsadmin' utility to download files to uncommon target folders, which could indicate a malicious activity or defense evasion technique. Essentially, the rule monitors process creation events in Windows systems, specifically looking for instances where 'bitsadmin.exe' is invoked. Key indicators include command-line arguments that suggest a file transfer operation combined with paths typically associated with temporary or application data, like '%AppData%' or 'C:\Windows\Temp\'. If a download occurs outside of standard target directories, it raises the alarm, inherently meaning that an attacker may be trying to obscure their activity or persist in a compromised system.
Categories
- Endpoint
- Windows
- On-Premise
Data Sources
- Process
Created: 2022-06-28