heroui logo

File Download Via Bitsadmin

Sigma Rules

View Source
Summary
The rule detects the usage of the `bitsadmin` tool, which is commonly used in Windows for downloading files, specifically focusing on its execution with critical command-line parameters that may indicate malicious intent. The detection framework targets specific patterns in the command line and images associated with `bitsadmin.exe`, including checks for creation and transfer operations through HTTP connections. This is particularly relevant in scenarios where attackers might use legitimate system tools to evade detection while downloading payloads or additional malicious files onto a system. By monitoring process creation events and analyzing the command lines and parent command lines for specific strings associated with potential misuse, the rule aims to identify and alert on possible indicators of compromise. The inclusion of potential false positives acknowledges that while `bitsadmin` can be used for legitimate activities, its monitoring is crucial given its use in various attack techniques, such as defense evasion or persistence. The detection relies on fields typical to process initiation to ensure comprehensive coverage of suspicious activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2017-03-09