Uncommon Child Process Of Appvlp.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects uncommon child processes of Appvlp.EXE Appvlp or the Application Virtualization Utility is included with Microsoft Office. Attackers are able to abuse "AppVLP" to execute shell commands. Normally, this binary is used for Application Virtualization, but it can also be abused to circumvent the ASR file path rule folder or to mark a file as a system file.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND PARENTPROCESSNAME endswith "\appvlp.exe" AND PROCESSNAME notendswith ":\Windows\SysWOW64\rundll32.exe,:\Windows\System32\rundll32.exe" AND ((PROCESSNAME notcontains ":\Program Files\Microsoft Office" OR PROCESSNAME notendswith "\msoasb.exe") AND ((PROCESSNAME notcontains ":\Program Files\Microsoft Office" OR PROCESSNAME notcontains "\SkypeSrv") OR PROCESSNAME notendswith "\SKYPESERVER.EXE") AND (PROCESSNAME notcontains ":\Program Files\Microsoft Office" OR PROCESSNAME notendswith "\MSOUC.EXE")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Sreeman