heroui logo

BITS Transfer Job Download From File Sharing Domains

Sigma Rules

View Source
Summary
This detection rule is designed to identify when BITS (Background Intelligent Transfer Service) jobs on Windows systems download files from known file sharing domains. BITS is commonly used for transferring files in the background in a way that minimizes network impact. The rule targets Event ID 16403, which is logged when a BITS transfer job is created that downloads content from certain high-risk file sharing sites. The presence of this event combined with a remote name containing specific strings associated with file sharing services can indicate potential malicious activity, such as malware being downloaded via these platforms, which are often used by threat actors to distribute files unnoticed. Detected file sharing domains include services like Dropbox, MediaFire, and Pastebin, among others. Given the nature of BITS and its legitimate uses, this detection may occasionally generate false positives, needing further investigation to ascertain the intent behind the file downloads. Users should act accordingly to assess any flagged activity thoroughly.
Categories
  • Windows
  • Network
Data Sources
  • Windows Registry
  • Network Traffic
  • Malware Repository
  • Logon Session
ATT&CK Techniques
  • T1197
Created: 2022-06-28