DET0440 Detecting PowerShell Execution via SyncAppvPublishingServer.vbs Proxy Abuse
| Item |
Value |
| ID |
DET0440 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1216.002 (SyncAppvPublishingServer)
Analytics
Windows
AN1220
Execution of SyncAppvPublishingServer.vbs through wscript.exe with a command-line containing embedded PowerShell, proxying malicious PowerShell execution through a Microsoft-signed VBScript interpreter to evade detection and restrictions.
Log Sources
Mutable Elements
| Field |
Description |
| CommandLineRegex |
Detects embedded PowerShell commands in SyncAppvPublishingServer.vbs invocation, e.g., {powershell -nop -enc ...} |
| ScriptInterpreter |
May vary between wscript.exe, cscript.exe, or called via cmd.exe |
| PowerShellObfuscationScore |
Used to detect encoding, obfuscation, or entropy level in embedded PowerShell payloads |
| TimeWindow |
Time delta between VBScript proxy invocation and PowerShell payload execution |