heroui logo

Uncommon Child Process Of Appvlp.EXE

Sigma Rules

View Source
Summary
This detection rule identifies uncommon child processes initiated by Appvlp.EXE, which is part of Microsoft Office's Application Virtualization Utility. Appvlp.EXE is primarily used for handling virtual applications, but its capabilities can be exploited by attackers to execute arbitrary shell commands, potentially allowing them to bypass application control policies (like ASR rules) or to manipulate file system behavior. The detection leverages process creation logs from Windows, focusing on instances where Appvlp.EXE spawns child processes that do not conform to expected behavior based on common applications and services associated with Office. The rule specifically avoids false positives by filtering out instances where the child process is a known, benign application like rundll32.exe, MSOUC.EXE, or components from Skype. Given that the usage of Appvlp.EXE in malicious scenarios is relatively rare, this rule presents a medium-level detection capability against potential exploitation attempts. It is crucial for organizations using virtualized Microsoft Office environments to monitor this activity closely, as it could indicate unauthorized access or control of a system.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2020-03-13