
Summary
The 'Windows Suspicious Named Pipe' rule is designed to detect the creation or connection to known suspicious named pipes on Windows systems. Utilizing Sysmon Event Codes 17 and 18, it identifies default pipe names frequently exploited by malicious actors to gain system access, facilitate persistence, or establish command and control (C2) communications. The detection logic filters out common applications or system processes to reduce false positives, focusing only on suspicious activities. When a match is found, it correlates data such as process details and timestamps, enabling analysts to trace potential threats effectively.
Categories
- Windows
- Endpoint
Data Sources
- Named Pipe
- Process
ATT&CK Techniques
- T1218
- T1559
- T1021.002
- T1055
Created: 2025-12-01