heroui logo

Windows System Script Proxy Execution Syncappvpublishingserver

Splunk Security Content

View Source
Summary
This detection rule identifies instances of the execution of 'Syncappvpublishingserver.vbs' via 'wscript.exe' or 'cscript.exe', which may indicate attempts at downloading files remotely or conducting privilege escalation actions. The rule leverages data from Endpoint Detection and Response (EDR) tools, analyzing process names and command-line inputs, which is critical for detecting unauthorized activities associated with Windows scripts. If confirmed malicious, such activities pose serious security risks, potentially leading to unauthorized file access or privilege elevation, necessitating vigilant monitoring of this behavior in enterprise environments.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1216
  • T1218
Created: 2024-11-13