
Summary
The detection rule focuses on identifying the execution of the SyncAppvPublishingServer process, which is often leveraged by adversaries to bypass PowerShell execution restrictions. This behavior is notable in scenarios where malicious actors are trying to execute scripts that are otherwise blocked by PowerShell's security features. The rule is structured to trigger when the `ScriptBlockText` contains a reference to `SyncAppvPublishingServer.exe`, indicating an attempt to run this application under the context of a PowerShell script. To ensure effective monitoring, it's essential that Script Block Logging is activated on the Windows environment. The detection level is categorized as medium, reflecting a moderate likelihood of indicating malicious activity. Nonetheless, there are acknowledged false positives, particularly in environments utilizing App-V clients, which may execute similar commands without malicious intent. For further details, references are provided to the LOLBAS (Living Off The Land Binaries and Scripts) Project that illustrates the legitimate uses of this binary.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
Created: 2020-10-05