heroui logo

SyncAppvPublishingServer Execute Arbitrary PowerShell Code

Sigma Rules

View Source
Summary
The rule detects the execution of arbitrary PowerShell code via the SyncAppvPublishingServer.exe application. This adversarial technique leverages a legitimate Windows binary often utilized in managing Microsoft Application Virtualization (App-V) deployments. The detection mechanism is triggered when the presence of the executable is confirmed, either through its file name or original file name, coupled with specific command-line arguments that include the string '\n;'. This condition checks for the execution of the binary aligning with known behaviors indicative of potential evasion tactics used by threat actors to run unauthorized scripts or commands. Given that legitimate applications may trigger false positives, context like user interactions and parent command lines are important for accurate identification of malicious actions. This serves to help defenders identify abuse of application publishing tools that can lead to unauthorized access or malware deployment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1218
Created: 2021-07-12