Detections
- Home
- - Detections
- -DT123
- ID: DT123
- Created: 20th May 2025
- Updated: 20th May 2025
- Platform: Windows
- Contributor: The ITM Team
Access to /mnt/c/ from Within WSL
Monitor for file access operations originating from within the WSL environment targeting the mounted Windows file system at /mnt/c/
. This behavior allows the subject to interact with the Windows host's data from a Linux context—often bypassing traditional Windows auditing tools and event logs.
Detection Methods:
Enable command-line logging and process creation auditing for wsl.exe
, bash.exe
, or associated Linux shells (e.g., zsh
, sh
).
Correlate command-line arguments or shell histories that reference paths under /mnt/c/
.
Use Sysmon (Event ID 1 – Process Creation) with advanced command-line rules or EDR telemetry to alert on file interactions such as:
cat /mnt/c/Users/...
cp /mnt/c/Users/Public/Documents/...
rm /mnt/c/Windows/System32/...
Track I/O operations on the Windows file system via WSL bridge using tools capable of inspecting WSL file operations (e.g., enhanced Sysmon configs or custom sensors on %LOCALAPPDATA%\Packages\
WSL paths).
Indicators:
Linux-based commands referencing mnt/c/Users
, mnt/c/Windows
, or mapped network drives.
High-volume copying, deletion, or modification of Windows files from inside WSL shells.
Use of obfuscation tools or compression (tar
, gzip
, openssl enc
) within /mnt/c/
.
Sections
ID | Name | Description |
---|---|---|
AF022.002 | Use of Windows Subsystem for Linux (WSL) | The subject leverages Windows Subsystem for Linux (WSL) to contain forensic artifacts within a Linux-like runtime environment embedded in Windows. By operating inside WSL, the subject avoids writing sensitive data, tool activity, or command history to traditional Windows locations, significantly reducing visibility to host-based forensic and security tools.
WSL creates a logical Linux environment that appears separate from the Windows file system. Although some host-guest integration exists, activity within WSL often bypasses standard Windows event logging, registry updates, and process tracking. This allows the subject to execute scripts, use Unix-native tools, stage exfiltration, or decrypt payloads with minimal footprint on the host.
Example Scenarios:
|