title: SyncAppvPublishingServer Execution to Bypass Powershell Restriction author: "Ensar \u015Eamil, @sblmsrsn, OSCD Community" date: 2020/10/05 description: Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions. detection: SELECTION_1: ScriptBlockText: '*SyncAppvPublishingServer.exe*' condition: SELECTION_1 falsepositives: - App-V clients id: dddfebae-c46f-439c-af7a-fdb6bde90218 level: medium logsource: category: ps_script product: windows modified: 2021/10/18 references: - https://lolbas-project.github.io/lolbas/Binaries/Syncappvpublishingserver/ related: - id: fde7929d-8beb-4a4c-b922-be9974671667 type: derived - id: 9f7aa113-9da6-4a8d-907c-5f1a4b908299 type: derived tags: - attack.defense_evasion - attack.t1218 yml_filename: powershell_syncappvpublishingserver_exe_in_scriptblocktext.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script