heroui logo

BITS Transfer Job Download To Potential Suspicious Folder

Sigma Rules

View Source
Summary
This detection rule identifies suspicious BITS (Background Intelligent Transfer Service) transfer jobs on Windows systems. It focuses on identifying new transfer jobs where the `LocalName` or saved file path includes specific directories that are commonly exploited by malicious actors, such as `Desktop`, `Public` user folder, and `PerfLogs`. The detection is triggered by monitoring Windows Event ID 16403, which indicates that a new BITS transfer job has been created. This is important for threat detection as legitimate transfers usually do not target these directories, which can lead to potential malware deployment or data exfiltration. Such activities can help an attacker persist within a network or evade detection through these commonly overlooked paths.
Categories
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
  • Process
  • File
ATT&CK Techniques
  • T1197
Created: 2022-06-28