
Summary
This detection rule is designed to identify when the Windows command-line tool 'bitsadmin' is used to download files to specific suspicious target folders. Bitsadmin is a command-line tool for managing Background Intelligent Transfer Service (BITS) jobs, allowing users to create, download, or upload files over HTTP. Attackers often misuse this tool to download malicious files to common folders like Temp or ProgramData, which can evade standard detection mechanisms. The rule checks for executions of bitsadmin.exe in combination with command-line arguments that indicate file transfers, specifically monitoring for transfers to target folders with a high likelihood of abuse in the context of file downloads. The detection logic is structured to trigger when both the process creation of bitsadmin and unauthorized folder usage is detected, thus providing a high-fidelity alert for potential malicious activity.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-06-28