
Summary
The detection rule monitors for instances where arbitrary PowerShell code is executed via the usage of the SyncAppvPublishingServer.vbs script on Windows systems. SyncAppvPublishingServer.vbs is a legitimate Windows script associated with application virtualization; however, attackers can exploit it to execute malicious PowerShell commands, leading to unauthorized access or execution of harmful operations within a system. This rule is particularly relevant in environments where the presence and execution of VBS scripts should be tightly controlled. It looks for command line arguments that include the script's path ('SyncAppvPublishingServer.vbs') along with the presence of a semicolon, which is often used to chain commands in PowerShell. The presence of these patterns can indicate an evasion technique used to execute additional commands in a single line. By implementing this detection rule, security teams can identify suspicious activities that may otherwise bypass conventional security mechanisms through the misuse of valid scripts.
Categories
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1216
Created: 2021-07-16