heroui logo

BITS Job Persistence

Splunk Security Content

View Source
Summary
This rule detects potential persistence mechanisms using BITS (Background Intelligent Transfer Service) through `bitsadmin.exe` on Windows endpoints. Attackers can leverage BITS jobs to maintain persistence in a compromised environment, facilitate the download of malicious files, and even exfiltrate sensitive data. The detection focuses on specific command-line parameters indicative of malicious behavior such as `create`, `addfile`, and `resume`. The data is gathered from Endpoint Detection and Response (EDR) solutions like Sysmon and Windows Event Logs, analyzing the processes and parent-child relationships between processes that utilize BITS. If found, such activity signals a need for deeper investigation as it may allow unauthorized access or data movement within an organization.
Categories
  • Windows
  • Endpoint
Data Sources
  • Web Credential
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1197
Created: 2024-11-13