heroui logo

Windows Compatibility Telemetry Suspicious Child Process

Splunk Security Content

View Source
Summary
This detection rule targets suspicious activities involving the execution of CompatTelRunner.exe, which is associated with Microsoft's Compatibility Telemetry. The rule monitors process invocations where CompatTelRunner.exe functions as a parent process, looking for child processes with command line parameters that deviate from expected usage patterns. Such deviations may indicate unauthorized attempts to leverage CompatTelRunner.exe for privilege escalation or establishing persistence on compromised systems. The rule relies on data from Endpoint Detection and Response (EDR) agents, specifically focusing on event data that includes process names, parent processes, command-line arguments, execution timestamps, and user-related information. The detection seeks to flag potential abuse of this legitimate system tool that could grant attackers elevated access or enable the execution of malicious payloads without typical user notice.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1546
  • T1053.005
Created: 2025-02-13