Suspicious Download From File-Sharing Website Via Bitsadmin

    Date: 08/26/2024

    Severity: Medium

    Summary

    "Suspicious Download From File-Sharing Website Via Bitsadmin" refers to a security issue where a file-sharing website is used to distribute files, and the Windows Bitsadmin tool is exploited to download these files. Bitsadmin is a command-line utility for managing download and upload tasks. When used maliciously, it can automate the downloading of potentially harmful files without user consent. This type of activity is flagged as suspicious because it often indicates the presence of malware or other security threats being spread through file-sharing platforms.

    Indicators of Compromise (IOC) List

    Image

    '\bitsadmin.exe'

    OriginalFilename

    'bitsadmin.exe'

    CommandLine

    ' /transfer '

    ' /create '

    ' /addfile '

    '.githubusercontent.com'

    'anonfiles.com'

    'cdn.discordapp.com'

    'ddns.net'

    'dl.dropboxusercontent.com'

    'ghostbin.co'

    'glitch.me'

    'gofile.io'

    'hastebin.com'

    'mediafire.com'

    'mega.nz'

    'onrender.com'

    'pages.dev'

    'paste.ee'

    'pastebin.com'

    'pastebin.pl'

    'pastetext.net'

    'privatlab.com'

    'privatlab.net'

    'send.exploit.in'

    'sendspace.com'

    'storage.googleapis.com'

    'storjshare.io'

    'supabase.co'

    'temp.sh'

    'transfer.sh'

    'trycloudflare.com'

    'ufile.io'

    'w3spaces.com'

    'workers.dev'

    Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection

    Detection Query 1

    ((((ResourceName = "Sysmon" AND eventtype = "1") AND image = "\bitsadmin.exe") AND originalfilename = "bitsadmin.exe") AND commandline in ("//transfer","//create","//addfile",".githubusercontent.com","anonfiles.com","cdn.discordapp.com","ddns.net","dl.dropboxusercontent.com","ghostbin.co","glitch.me","gofile.io","hastebin.com","mediafire.com","mega.nz","onrender.com","pages.dev","paste.ee","pastebin.com","pastebin.pl","pastetext.net","privatlab.com","privatlab.net","send.exploit.in","sendspace.com","storage.googleapis.com","storjshare.io","supabase.co","temp.sh","transfer.sh","trycloudflare.com","ufile.io","w3spaces.com","workers.dev"))

    Detection Query 2

    ((((Technologygroup = "EDR" ) AND image = "\bitsadmin.exe") AND originalfilename = "bitsadmin.exe") AND commandline in ("//transfer","//create","//addfile",".githubusercontent.com","anonfiles.com","cdn.discordapp.com","ddns.net","dl.dropboxusercontent.com","ghostbin.co","glitch.me","gofile.io","hastebin.com","mediafire.com","mega.nz","onrender.com","pages.dev","paste.ee","pastebin.com","pastebin.pl","pastetext.net","privatlab.com","privatlab.net","send.exploit.in","sendspace.com","storage.googleapis.com","storjshare.io","supabase.co","temp.sh","transfer.sh","trycloudflare.com","ufile.io","w3spaces.com","workers.dev"))

    Reference:

    https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_file_sharing_domains.yml


    Tags

    MalwareSigmaPhishingExploit

    « Previous ArticleNext Article »

    Comments

    No records to display

    Looking for Something?
    Threat Research Categories:
    Tags