
Summary
This detection rule identifies suspicious modifications within the Windows Compatibility Telemetry settings by monitoring the registry keys related to telemetry, specifically the "TelemetryController" key and the associated "Command" value. The rule utilizes the Endpoint.Registry data model to track changes in registry paths and values indicative of unauthorized tampering. The significance of this detection lies in the capability of the CompatTelRunner.exe and the Microsoft Compatibility Appraiser task, which normally operate under the SYSTEM context, potentially enabling privilege escalation, unauthorized code execution, or persistence mechanisms when compromised. The detection is designed with a search that analyzes Sysmon Event ID 13 entry logs corresponding to registry changes, filtering out normal commands to focus on malicious activity. This proactive monitoring can help mitigate risks from attackers seeking to manipulate Windows telemetry for nefarious purposes.
Categories
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1546
- T1053.005
Created: 2025-02-13