BITS Transfer Jobs
WindowsPersistence MechanismsDisk Image
Location
C:\ProgramData\Microsoft\Network\Downloader\qmgr.dbDescription
Background Intelligent Transfer Service database tracking all BITS jobs including download URL, destination path, creation time, and job owner SID.
Forensic Value
Adversaries abuse BITS jobs for stealthy file downloads and persistence because BITS transfers survive reboots and run under the SYSTEM context. Parsing qmgr.db reveals download URLs for second-stage payloads, staging paths, and the exact user account that initiated the transfer. BITS jobs do not appear in standard proxy logs if the system uses direct connections.
Tools Required
KAPEBitsParserBITS-parser (ANSSI)
Collection Commands
KAPE
kape.exe --tsource C: --tdest C:\output --target BITSDb
BitsParser
python3 BitsParser.py -i "C:\ProgramData\Microsoft\Network\Downloader\qmgr.db" -o C:\output\bits_parsed.csv
PowerShell
Get-BitsTransfer -AllUsers | Format-List *
BITS-parser
python3 bits_parser.py "C:\ProgramData\Microsoft\Network\Downloader\qmgr.db" -o C:\output
Collection Constraints
- •Availability, retention, and field coverage depend on the Windows release, SKU, per-host audit policy, and user activity. Treat absence as inconclusive unless you verified the feature was enabled.
MITRE ATT&CK Techniques
T1197T1105