T1216.002 SyncAppvPublishingServer
Adversaries may abuse SyncAppvPublishingServer.vbs to proxy execution of malicious PowerShell commands. SyncAppvPublishingServer.vbs is a Visual Basic script associated with how Windows virtualizes applications (Microsoft Application Virtualization, or App-V).6 For example, Windows may render Win32 applications to users as virtual applications, allowing users to launch and interact with them as if they were installed locally.25
The SyncAppvPublishingServer.vbs script is legitimate, may be signed by Microsoft, and is commonly executed from \System32 through the command line via wscript.exe.13
Adversaries may abuse SyncAppvPublishingServer.vbs to bypass PowerShell execution restrictions and evade defensive counter measures by “living off the land.”71 Proxying execution may function as a trusted/signed alternative to directly invoking powershell.exe.4
For example, PowerShell commands may be invoked using:3
SyncAppvPublishingServer.vbs "n; {PowerShell}"
| Item | Value |
|---|---|
| ID | T1216.002 |
| Sub-techniques | T1216.001, T1216.002 |
| Tactics | TA0005 |
| Platforms | Windows |
| Version | 1.0 |
| Created | 06 February 2024 |
| Last Modified | 15 April 2025 |
Mitigations
| ID | Mitigation | Description |
|---|---|---|
| M1038 | Execution Prevention | Certain signed scripts that can be used to execute other programs may not be necessary within a given environment. Use application control configured to block execution of these scripts if they are not required for a given system or network to prevent potential misuse by adversaries. |
References
-
John Fokker. (2022, March 17). Suspected DarkHotel APT activity update. Retrieved February 6, 2024. ↩↩
-
Microsoft. (2022, November 3). Getting started with App-V for Windows client. Retrieved February 6, 2024. ↩
-
Nick Landers, Casey Smith. (n.d.). /Syncappvpublishingserver.vbs. Retrieved February 6, 2024. ↩↩
-
Nick Landers. (2017, August 8). Need a signed alternative to Powershell.exe? SyncAppvPublishingServer in Win10 has got you covered.. Retrieved September 12, 2024. ↩
-
Raj Chandel. (2022, March 17). Indirect Command Execution: Defense Evasion (T1202). Retrieved February 6, 2024. ↩
-
SEONGSU PARK. (2022, December 27). BlueNoroff introduces new methods bypassing MoTW. Retrieved February 6, 2024. ↩
-
Strontic. (n.d.). SyncAppvPublishingServer.exe. Retrieved February 6, 2024. ↩