heroui logo

WSL Child Process Anomaly

Sigma Rules

View Source
Summary
The WSL Child Process Anomaly rule is designed to detect unusual child processes being spawned from Windows Subsystem for Linux (WSL) processes, specifically when the parent process is either 'wsl.exe' or 'wslhost.exe'. This detection mechanism aims to uncover potential abuse or evasion techniques employed by attackers who may use WSL to create persistence mechanisms or perform malicious activities while attempting to avoid standard detection methodologies. The rule analyzes child processes that exhibit specific behaviors, such as executing from specific directories like 'C:\Users\Public\', 'C:\Windows\Temp\', and 'C:\Temp\', as well as from known executable paths like 'calc.exe', 'cmd.exe', and 'powershell.exe'. The presence of these processes being initiated by WSL could suggest an elevated risk of compromise and thus warrants further investigation.
Categories
  • Windows
Data Sources
  • Process
Created: 2023-01-23