MEDIUM PowerShell downloads files via BITS

Detected ID: #1899 | Detected: 2026-01-02 11:49:56 | Persistence
Alert Overview

Process action type = execution AND target process cmd = *start-bitstransfer*, *complete-bitstransfer* AND target process name = powershell.exe AND process execution signature = Signed AND process execution signer = Microsoft Corporation Host host os = windows

Unclassified
XDR BIOC
New
DS:PANW/XDR Agent DOM:Security
Host Information
BOOK-R0BE6S1NC3
BOOK-R0BE6S1NC3\ubuntu
-
Process Information Process Execution
Actor Process (Executor)
Process Name python.exe
Path C:\Users\ubuntu\scoop\apps\python\3.13.2\python.exe
PID 37232
SHA256 7d96a4ed35d6e596cd9dd8933feafc66349cc21f75be3b15c89fd336e50140c1 VT
MD5 5b4a9fba45e770366c5a8f973f6c6ab1
Signature Python Software Foundation Signed
"C:\app\cortex-xdr-siem-test\.venv\Scripts\python.exe"  "C:\app\cortex-xdr-siem-test\cortex_xdr_test.py" --test 2
Action Process (Target)
Process Name powershell.exe
SHA256 0ff6f2c94bc7e2833a5f7e16de1622e5dba70396f31c7d5f56381870317e8c46 VT
Signature Microsoft Corporation Signed
powershell -Command "$null = \"Import-Module BitsTransfer; Start-BitsTransfer 'http://test.local' 'c:\temp\test'\""
Parent Process (Causality)
Process Name mmc.exe
Path C:\Windows\System32\mmc.exe
SHA256 48ec341bf3efd9a78141a01f15cd3548f10cd6c56793a9d3705b884d06bb956e VT
MD5 6b16d40d2db968844c1b7d0fb0b05500
"C:\windows\system32\mmc.exe" "C:\windows\system32\taskschd.msc" /s
Severity Analysis
MEDIUM

Review and assess impact

Summary
Events 1
IP Addresses 2
Tags 2
File Artifacts Yes
Network Artifacts No
Registry Artifacts No
Analyst Verdict