
Summary
This rule detects potential persistence mechanisms using BITS (Background Intelligent Transfer Service) through `bitsadmin.exe` on Windows endpoints. Attackers can leverage BITS jobs to maintain persistence in a compromised environment, facilitate the download of malicious files, and even exfiltrate sensitive data. The detection focuses on specific command-line parameters indicative of malicious behavior such as `create`, `addfile`, and `resume`. The data is gathered from Endpoint Detection and Response (EDR) solutions like Sysmon and Windows Event Logs, analyzing the processes and parent-child relationships between processes that utilize BITS. If found, such activity signals a need for deeper investigation as it may allow unauthorized access or data movement within an organization.
Categories
- Windows
- Endpoint
Data Sources
- Web Credential
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1197
Created: 2024-11-13