Skip to content

Commit e68bc6a

Browse files
committed
[Rule Tuning] Host File System Changes via Windows Subsystem for Linux
1 parent c3d0916 commit e68bc6a

File tree

1 file changed

+13
-10
lines changed

1 file changed

+13
-10
lines changed

rules/windows/defense_evasion_wsl_filesystem.toml

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
creation_date = "2023/01/12"
33
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/12/01"
66

77
[rule]
88
author = ["Elastic"]
99
description = """
10-
Detects files creation and modification on the host system from the the Windows Subsystem for Linux. Adversaries may
11-
enable and use WSL for Linux to avoid detection.
10+
Detects file creation and modification on the host system from the Windows Subsystem for Linux. Adversaries may enable
11+
and use WSL to avoid detection.
1212
"""
1313
from = "now-9m"
1414
index = [
@@ -20,13 +20,13 @@ index = [
2020
]
2121
language = "eql"
2222
license = "Elastic License v2"
23-
name = "Host Files System Changes via Windows Subsystem for Linux"
23+
name = "Host File System Changes via Windows Subsystem for Linux"
2424
note = """## Triage and analysis
2525
2626
> **Disclaimer**:
2727
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
2828
29-
### Investigating Host Files System Changes via Windows Subsystem for Linux
29+
### Investigating Host File System Changes via Windows Subsystem for Linux
3030
3131
Windows Subsystem for Linux (WSL) allows users to run a Linux environment directly on Windows, facilitating seamless file access between systems. Adversaries may exploit WSL to modify host files stealthily, bypassing traditional security measures. The detection rule identifies suspicious file operations initiated by WSL processes, particularly those involving the Plan9FileSystem, to flag potential defense evasion attempts.
3232
@@ -75,11 +75,14 @@ type = "eql"
7575

7676
query = '''
7777
sequence by process.entity_id with maxspan=5m
78-
[process where host.os.type == "windows" and event.type == "start" and
79-
process.name : "dllhost.exe" and
80-
/* Plan9FileSystem CLSID - WSL Host File System Worker */
81-
process.command_line : "*{DFB65C4C-B34F-435D-AFE9-A86218684AA8}*"]
82-
[file where host.os.type == "windows" and process.name : "dllhost.exe" and not file.path : "?:\\Users\\*\\Downloads\\*"]
78+
[process where host.os.type == "windows" and event.type == "start" and
79+
process.name : "dllhost.exe" and
80+
/* Plan9FileSystem CLSID - WSL Host File System Worker */
81+
process.command_line : "*{DFB65C4C-B34F-435D-AFE9-A86218684AA8}*"]
82+
[file where host.os.type == "windows" and process.name : "dllhost.exe" and
83+
not file.path : (
84+
"?:\\Users\\*\\Downloads\\*",
85+
"?:\\Windows\\Prefetch\\DLLHOST.exe-????????.pf")]
8386
'''
8487

8588

0 commit comments

Comments
 (0)