Generalising file paths and urls, see #10 (#422)

This commit is contained in:
Wietze
2025-01-28 11:15:01 +00:00
committed by GitHub
parent e62749f81a
commit a79893e7ad
196 changed files with 555 additions and 758 deletions

View File

@@ -1,7 +1,7 @@
---
Name: Wsl.exe
Description: Windows subsystem for Linux executable
Author: 'Matthew Brown'
Author: Matthew Brown
Created: 2019-06-27
Commands:
- Command: wsl.exe -e /mnt/c/Windows/System32/calc.exe
@@ -22,7 +22,7 @@ Commands:
OperatingSystem: Windows 10, Windows Server 2019, Windows 11
Tags:
- Execute: CMD
- Command: wsl.exe --exec bash -c "<command>"
- Command: wsl.exe --exec bash -c "{CMD}"
Description: Executes Linux command (for example via bash) as the default user (unless stated otherwise using `-u <username>`) on the default WSL distro (unless stated otherwise using `-d <distro name>`)
Usecase: Performs execution of arbitrary Linux commands.
Category: Execute
@@ -40,8 +40,6 @@ Commands:
OperatingSystem: Windows 10, Windows Server 2019, Windows 11
Full_Path:
- Path: C:\Windows\System32\wsl.exe
Code_Sample:
- Code:
Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_wsl_lolbin_execution.yml
- BlockRule: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules