title: SyncAppvPublishingServer Execute Arbitrary PowerShell Code author: frack113 date: 2021/07/12 description: Executes arbitrary PowerShell code using SyncAppvPublishingServer.exe. detection: SELECTION_1: EventID: 1 SELECTION_2: Image: '*\SyncAppvPublishingServer.exe' SELECTION_3: CommandLine: '*"n; *' condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) falsepositives: - App-V clients fields: - ComputerName - User - CommandLine - ParentCommandLine id: fbd7c32d-db2a-4418-b92c-566eb8911133 level: medium logsource: category: process_creation product: windows modified: 2021/09/12 references: - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218/T1218.md - https://lolbas-project.github.io/lolbas/Binaries/Syncappvpublishingserver/ related: - id: fde7929d-8beb-4a4c-b922-be9974671667 type: obsoletes status: experimental tags: - attack.defense_evasion - attack.t1218 yml_filename: process_creation_syncappvpublishingserver_execute_arbitrary_powershell.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation