(SIGMA) SIGMA_bitsadmin
title: bitsadmin download and execute
status: experimental
description: Detect bitsadmin download and execute activity
author: Joe Security
date: 2019-11-25
id: 200031
threatname:
behaviorgroup: 1
classification: 8
mitreattack:
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine:
- '*bitsadmin /transfer*http*start %APPDATA%*'
- '*/transfer*http*.dll&& rundll32*'
- '*powershell*start-bitstransfer*start-process*'
condition: selection
level: critical
Associated Techniques
No associated technique found so far.
Created
June 20, 2022
Last Revised
June 20, 2022