heroui logo

WSL Kali-Linux Usage

Sigma Rules

View Source
Summary
The rule titled 'WSL Kali-Linux Usage' is designed to detect instances where Kali Linux is being run through the Windows Subsystem for Linux (WSL) on Windows systems. The detection logic focuses on identifying processes associated with Kali Linux by looking for specific indicators in the image paths and command line arguments of processes created. The rule triggers an alert when it detects any process images from the Kali Linux installation path (including common installation directories like AppData and Program Files) or when the execution of the Kali Linux executable 'kali.exe' happens under a parent WSL process such as 'wsl.exe' or 'wslhost.exe'. Additionally, it incorporates filters to avoid false positives by excluding scenarios where administrators or security teams may legitimately use or install Kali Linux. The overall detection is marked with a high severity level due to the potential misuse of Kali Linux, a penetration testing tool, which could indicate malicious intent if used without appropriate authorization.
Categories
  • Windows
Data Sources
  • Process
Created: 2025-10-10