heroui logo

Monitoring For Persistence Via BITS

Sigma Rules

View Source
Summary
This detection rule focuses on the Windows Background Intelligent Transfer Service (BITS), which can be exploited by threat actors to maintain persistence in infected systems. BITS allows commands to be scheduled for execution upon the successful download of files, which can include malicious binaries. The rule aims to monitor for specific command line invocations related to BITS, particularly those that indicate a command is set to notify about the completion of a download and those that add files that could be fetched over various protocols (HTTP, HTTPS, FTP, etc.). By analyzing how BITS jobs are constructed and executed, security teams can identify potential backdoor mechanisms that utilize this service. The detection conditions specify monitoring for processes invoking BITS-specific commands to flag suspicious activity and aid in identifying persistence strategies employed by malware.
Categories
  • Windows
  • Cloud
  • Endpoint
Data Sources
  • Process
  • Image
Created: 2020-10-29