EXPLORE
← Back to Explore
sigmahighHunting

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

MITRE ATT&CK

command-and-controldefense-evasionpersistence

Detection Query

selection:
  c-useragent|startswith: Microsoft BITS/
falsepositives:
  cs-host|endswith:
    - .com
    - .net
    - .org
    - .scdn.co
    - .sfx.ms
condition: selection and not falsepositives

Author

Florian Roth (Nextron Systems), Tim Shelton

Created

2019-03-07

Data Sources

proxy

Tags

attack.command-and-controlattack.t1071.001attack.defense-evasionattack.persistenceattack.t1197attack.s0190
Raw Content
title: Bitsadmin to Uncommon TLD
id: 9eb68894-7476-4cd6-8752-23b51f5883a7
status: test
description: Detects Bitsadmin connections to domains with uncommon TLDs
references:
    - https://twitter.com/jhencinski/status/1102695118455349248
    - https://isc.sans.edu/forums/diary/Investigating+Microsoft+BITS+Activity/23281/
author: Florian Roth (Nextron Systems), Tim Shelton
date: 2019-03-07
modified: 2023-05-17
tags:
    - attack.command-and-control
    - attack.t1071.001
    - attack.defense-evasion
    - attack.persistence
    - attack.t1197
    - attack.s0190
logsource:
    category: proxy
detection:
    selection:
        c-useragent|startswith: 'Microsoft BITS/'
    falsepositives:
        cs-host|endswith:
            - '.com'
            - '.net'
            - '.org'
            - '.scdn.co' # spotify streaming
            - '.sfx.ms' # Microsoft domain, example request: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-08-15-21-xx-xx/PreSignInSettingsConfig.json
    condition: selection and not falsepositives
falsepositives:
    - Rare programs that use Bitsadmin and update from regional TLDs e.g. .uk or .ca
level: high