
Summary
This detection rule identifies potential persistence attempts through manipulation of the Windows telemetry registry key. The rule focuses on the binary `CompatTelRunner.exe`, which executes various commands driven by registry configurations. Due to the flexible nature of this binary, it can run arbitrary commands configured via the registry without restrictions on their source or type, making it a vector for malicious persistence. The detection relies on Sysmon to monitor specific registry entries under the `AppCompatFlags\TelemetryController` subkey in the HKLM hive. If any commands matching certain file extensions are found, and they are called via `CompatTelRunner.exe`, this could indicate a persistence tactic being exploited. The detection has a high severity level due to the potential for malicious commands to be executed which can compromise system integrity or enable further attacks. If a command is detected which meets the criteria without showing signs of legitimate use, it could trigger an alert for investigation.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
Created: 2020-10-16