heroui logo

Potential Persistence Via Microsoft Compatibility Appraiser

Sigma Rules

View Source
Summary
This detection rule focuses on the identification of potential persistence mechanisms via the Microsoft Compatibility Appraiser in a Windows environment. The detection strategy targets the manual execution of tasks associated with the 'Microsoft Compatibility Appraiser' using the 'schtasks.exe' command. It specifically looks for certain criteria in process creation events, ensuring that such process invocations align with known patterns of abuse detailed in security research. The rule leverages the Windows registry key 'TelemtryController' found in '\AppCompatFlags' which attackers may manipulate to persistently execute their payloads through legitimate system processes. If a schtasks command contains the specified parameters indicating engagement with the Microsoft Compatibility Appraiser, it creates an alert as this behavior is indicative of potential lateral movement or persistence techniques being used by malicious actors. False positives may occur due to legitimate system operations that utilize similar mechanisms.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Windows Registry
Created: 2020-09-29