
Summary
This rule detects the creation of the default RemCom named pipe, which is commonly associated with lateral movement activities in Windows environments. RemCom is a tool that allows remote command execution, which can potentially be misused by attackers for malicious purposes. The rule is configured to identify specific named pipe creations that contain '\RemCom' in their name, and it relies on Sysmon logging to capture events associated with named pipes (specifically Event ID 17 and Event ID 18). To ensure that detection works effectively, it is crucial to have Sysmon configured correctly to log these events. The rule's author recommends using popular Sysmon configuration repositories to facilitate proper logging. While implementing this rule, one should consider legitimate administrative activities that may create similar named pipes as a source of false positives.
Categories
- Endpoint
- Windows
Data Sources
- Named Pipe
- Process
Created: 2023-08-07