Ingress Transfer via Windows BITS
Adversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.
The Windows Background Intelligent Transfer Service (BITS) is a legitimate Windows service that allows for prioritized, asynchronous, and throttled transfer of files between a client and a server. Adversaries abuse BITS to download malicious payloads while evading typical security protections, as file transfers occur in the context of the svchost.exe process. This activity can obscure the origin of the download and bypass application whitelisting rules. This detection focuses on identifying file rename events where svchost.exe renames temporary BITS files (BIT*.tmp) to executable or archive file types, indicating a potential malicious download via BITS. This technique is commonly employed to deliver malware, exfiltrate data, or download additional tools.
Attack Chain
- An attacker gains initial access to a system (e.g., through phishing or exploiting a vulnerability).
- The attacker uses a script or command-line interface (e.g., PowerShell) to create a BITS job.
- The BITS job is configured to download a malicious executable or archive from a remote server using the
bitsadmin.exeutility. - BITS downloads the file to a temporary location on the system with a
BIT*.tmpextension. - The
svchost.exeprocess renames the temporary file to its final name and extension (e.g., .exe, .zip). - The attacker executes the downloaded file, initiating further malicious activities.
- The malware establishes persistence through registry keys or scheduled tasks.
- The malware communicates with a command and control (C2) server to receive instructions and exfiltrate data.
Impact
Successful exploitation enables attackers to download and execute arbitrary code on compromised systems. The use of BITS can bypass traditional security measures, leading to malware infections, data theft, and potentially full system compromise. This technique can be used in conjunction with other attack vectors to establish a persistent foothold within the network. While the rule itself triggers at low severity, the identified activity can be an early warning of more severe attack stages.
Recommendation
- Deploy the “Ingress Transfer via Windows BITS” Sigma rule to your SIEM and tune for your environment.
- Enable Sysmon file creation and process creation logging to enhance visibility into BITS-related activities.
- Monitor network connections initiated by
svchost.exeto identify potentially malicious downloads. - Investigate any instances of
bitsadmin.exebeing executed, especially with command-line arguments indicative of suspicious downloads. - Review
Microsoft-Windows-Bits-Client/OperationalWindows logs (event ID 59) for unusual BITS events. - Block known malicious domains or IP addresses associated with BITS-related attacks at the firewall or DNS resolver.
Detection coverage 2
Detect Ingress Transfer via Windows BITS File Rename
lowDetects file rename events where svchost.exe renames temporary BITS files to executable or archive file types.
Detect Suspicious File Extension after BITS Rename
mediumDetects suspicious file extensions after a rename operation by svchost.exe from a temporary BITS file.
Detection queries are kept inside the platform. Get full rules →