Skip to content

Commit 26cb092

Browse files
tccontrenasbench
andauthored
Update detections/endpoint/windows_anonymous_pipe_activity.yml
Co-authored-by: Nasreddine Bencherchali <[email protected]>
1 parent 4e6b095 commit 26cb092

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/endpoint/windows_anonymous_pipe_activity.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2025-02-11'
55
author: Teoderick Contreras, Splunk
66
status: production
7-
type: Anomaly
7+
type: Hunting
88
description: The following analytic detects the creation or connection of anonymous pipes for inter-process communication (IPC) within a Windows environment. Anonymous pipes are commonly used by legitimate system processes, services, and applications to transfer data between related processes. However, adversaries frequently abuse anonymous pipes to facilitate stealthy process injection, command-and-control (C2) communication, credential theft, or privilege escalation. This detection monitors for unusual anonymous pipe activity, particularly involving non-system processes, unsigned executables, or unexpected parent-child process relationships. While legitimate use cases exist—such as Windows services, software installers, or security tools—unusual or high-frequency anonymous pipe activity should be investigated for potential malware, persistence mechanisms, or lateral movement techniques.
99
data_source:
1010
- Sysmon EventID 17

0 commit comments

Comments
 (0)