LoFP LoFP / t1197

t1197

TitleTags
administrator powershell scripts
limited false positives will be present. typically, applications will use `bitsadmin.exe`. any filtering should be done based on command-line arguments (legitimate applications) or parent process.
limited false positives, however it may be required to filter based on parent process name or network connection.
limited false positives. it is possible administrators will utilize start-bitstransfer for administrative tasks, otherwise filter based parent process or command-line arguments.
many legitimate applications or scripts could leverage \"bitsadmin\". this event is best correlated with eid 16403 via the jobid field
rare programs that use bitsadmin and update from regional tlds e.g. .uk or .ca
some legitimate apps use this, but limited.
some system administrators or development teams may use tools like curl or powershell to download files from public services for legitimate automation or scripting purposes. however, use of these binaries to contact domains commonly associated with file sharing or temporary hosting should be carefully reviewed, as such services are frequently abused by threat actors for malware delivery and staging. tuning by domain allowlisting or internal usage policies is recommended.
this rule doesn't exclude other known tlds such as \".org\" or \".net\". it's recommended to apply additional filters for software and scripts that leverage the bits service
usage of these flags to reach public ips or uncommon destinations should be reviewed. tuning may be required for domains with known certificate issues.
while the file extensions in question can be suspicious at times. it's best to add filters according to your environment to avoid large amount false positives