heroui logo

File Download Via Bitsadmin To An Uncommon Target Folder

Sigma Rules

View Source
Summary
This detection rule identifies the use of the 'bitsadmin' utility to download files to uncommon target folders, which could indicate a malicious activity or defense evasion technique. Essentially, the rule monitors process creation events in Windows systems, specifically looking for instances where 'bitsadmin.exe' is invoked. Key indicators include command-line arguments that suggest a file transfer operation combined with paths typically associated with temporary or application data, like '%AppData%' or 'C:\Windows\Temp\'. If a download occurs outside of standard target directories, it raises the alarm, inherently meaning that an attacker may be trying to obscure their activity or persist in a compromised system.
Categories
  • Endpoint
  • Windows
  • On-Premise
Data Sources
  • Process
Created: 2022-06-28