Query Details
Tags:
Query://This need a bit of fixing
let badPipeNames = pack_array('psexesvc','paexec','remcom');
DeviceEvents
| where ActionType == "NamedPipeEvent"
| extend ParsedFields=parse_json(AdditionalFields)
//| where ParsedFields.FileOperation == "File created"
//tolower(tostring(split(FileName,'\\')[-1]))
| extend foo = tolower(tostring(split(ParsedFields.PipeName,'\\')[-1]))
| project foo, ParsedFields.PipeName
| where foo in(badPipeNames)
This query is designed to identify specific named pipes that are potentially malicious. Here's a simplified summary:
psexesvc, paexec, remcom).In essence, the query is filtering and identifying events related to specific named pipes that are known to be used by malicious software.

Ali Hussein
Released: October 11, 2023
Tables
Keywords
Operators