Common Information
Type | Value |
---|---|
Value |
SyncAppvPublishingServer - T1216.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse SyncAppvPublishingServer.vbs to proxy execution of malicious [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands. SyncAppvPublishingServer.vbs is a Visual Basic script associated with how Windows virtualizes applications (Microsoft Application Virtualization, or App-V).(Citation: 1 - appv) For example, Windows may render Win32 applications to users as virtual applications, allowing users to launch and interact with them as if they were installed locally.(Citation: 2 - appv)(Citation: 3 - appv) The SyncAppvPublishingServer.vbs script is legitimate, may be signed by Microsoft, and is commonly executed from `\System32` through the command line via `wscript.exe`.(Citation: 4 - appv)(Citation: 5 - appv) Adversaries may abuse SyncAppvPublishingServer.vbs to bypass [PowerShell](https://attack.mitre.org/techniques/T1059/001) execution restrictions and evade defensive counter measures by "living off the land."(Citation: 6 - appv)(Citation: 4 - appv) Proxying execution may function as a trusted/signed alternative to directly invoking `powershell.exe`.(Citation: 7 - appv) For example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands may be invoked using:(Citation: 5 - appv) `SyncAppvPublishingServer.vbs "n; {PowerShell}"` |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-01 | 4 | Finding the LNK: Techniques and methodology for advanced analysis with Velociraptor | Rapid7 Blog | ||
Details | Website | 2024-09-02 | 51 | Stone Wolf employs Meduza Stealer to hack Russian companies | ||
Details | Website | 2023-10-03 | 94 | Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement | Microsoft Security Blog | ||
Details | Website | 2023-09-19 | 100 | Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos - Check Point Research | ||
Details | Website | 2023-08-07 | 2 | Run Powershell command without Powershell.exe | ||
Details | Website | 2023-06-19 | 24 | APT-41 Backdoor Analysis | ||
Details | Website | 2022-12-27 | 130 | BlueNoroff introduces new methods bypassing MoTW | ||
Details | Website | 2022-11-23 | 3 | Chrome Extension Deploy Windows Malware to Steal Crypto | ||
Details | Website | 2022-11-21 | 72 | ViperSoftX: Hiding in System Logs and Spreading VenomSoftX - Avast Threat Labs | ||
Details | Website | 2022-11-02 | 118 | Server-side attacks, C&C in public clouds and other MDR cases we observed | ||
Details | Website | 2022-09-29 | 3 | Fancy Bear Hackers Distributing Graphite Malware using PowerPoint Files | ||
Details | Website | 2022-09-27 | 3 | Fancy Bear hackers exploit PowerPoint files to spread Graphite malware | IT PRO | ||
Details | Website | 2022-09-26 | 6 | Hackers use PowerPoint files for 'mouseover' malware delivery | ||
Details | Website | 2022-09-23 | 44 | In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants | ||
Details | Website | 2022-03-17 | 36 | Suspected DarkHotel APT Activity Update | ||
Details | Website | 2022-01-31 | 83 | Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables | ||
Details | Website | 2018-12-27 | 37 | The Enigmatic “Roma225” Campaign - Yoroi |