
Summary
This rule detects the execution of Windows binaries from within the Windows Subsystem for Linux (WSL) environment. WSL enables users to run a Linux environment directly on Windows, including command-line tools and applications. However, the execution of Windows binaries from within WSL can be indicative of lateral movement or evasion tactics by an attacker who might be trying to bypass traditional detection mechanisms that focus only on either Windows or Linux environments separately. This detection is primarily based on identifying process creation events where the executed binary's path indicates it is a Windows binary, specifically looking for Windows drive letters in the image path and the current directory being a WSL-specific path. The rule aims to uncover potentially malicious activity that leverages the capabilities of WSL to execute Windows processes, thereby maintaining a low profile and masquerading parent-child relationships between processes.
Categories
- Windows
- Linux
- Containers
Data Sources
- Process
Created: 2023-02-14