- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects BITS transfer jobs that download files directly from IP addresses rather than domain names.
This rule monitors Windows event ID 16403
, which records when BITS transfer jobs are created. BITS is a Windows service that provides file transfer functionality and can operate in the background and resume after interruptions. This capability is concerning because BITS runs with SYSTEM privileges and can continue transfers even when users are logged off.
The query focuses on the @Event.EventData.Data.RemoteName
field, looking for URL patterns that start with HTTP or HTTPS and are followed by numeric IP addresses (beginning with digits 1-9). The detection specifically targets transfers where files are downloaded directly from IP addresses rather than domain names, while excluding private IP address ranges.
Direct IP address usage in BITS transfers is uncommon for legitimate software, as domain names provide better reliability through DNS resolution. Attackers often use direct IP addresses to avoid DNS-based detection mechanisms and to maintain access to command and control infrastructure even if domain names are blocked.
{{host}}
, focusing on the remote URL {{@Event.EventData.Data.RemoteName}}
, local destination path, and job status.HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
, Windows Update service properties, and Task Scheduler entries.Remove-BitsTransfer
and delete any downloaded malicious files.