Potential Registry Persistence Attempt Via Windows Telemetry
Detects potential persistence behavior using the windows telemetry registry key. Windows telemetry makes use of the binary CompatTelRunner.exe to run a variety of commands and perform the actual telemetry collections. This binary was created to be easily extensible, and to that end, it relies on the registry to instruct on which commands to run. The problem is, it will run any arbitrary command without restriction of location or type.
Sigma rule (View on GitHub)
1title: Potential Registry Persistence Attempt Via Windows Telemetry
2id: 73a883d0-0348-4be4-a8d8-51031c2564f8
3related:
4 - id: 4e8d5fd3-c959-441f-a941-f73d0cdcdca5
5 type: obsolete
6status: test
7description: |
8 Detects potential persistence behavior using the windows telemetry registry key.
9 Windows telemetry makes use of the binary CompatTelRunner.exe to run a variety of commands and perform the actual telemetry collections.
10 This binary was created to be easily extensible, and to that end, it relies on the registry to instruct on which commands to run.
11 The problem is, it will run any arbitrary command without restriction of location or type.
12references:
13 - https://www.trustedsec.com/blog/abusing-windows-telemetry-for-persistence/
14author: Lednyov Alexey, oscd.community, Sreeman
15date: 2020-10-16
16modified: 2023-08-17
17tags:
18 - attack.persistence
19 - attack.t1053.005
20logsource:
21 category: registry_set
22 product: windows
23 definition: 'Requirements: Sysmon config that monitors \SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController subkey of the HKLM hives'
24detection:
25 selection:
26 TargetObject|contains: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController\'
27 TargetObject|endswith: '\Command'
28 Details|contains:
29 - '.bat'
30 - '.bin'
31 - '.cmd'
32 - '.dat'
33 - '.dll'
34 - '.exe'
35 - '.hta'
36 - '.jar'
37 - '.js'
38 - '.msi'
39 - '.ps'
40 - '.sh'
41 - '.vb'
42 filter_main_generic:
43 Details|contains:
44 - '\system32\CompatTelRunner.exe'
45 - '\system32\DeviceCensus.exe'
46 condition: selection and not 1 of filter_main_*
47falsepositives:
48 - Unknown
49level: high
References
Related rules
- Defrag Deactivation
- HackTool - Default PowerSploit/Empire Scheduled Task Creation
- Important Scheduled Task Deleted/Disabled
- Kapeka Backdoor Persistence Activity
- Kapeka Backdoor Scheduled Task Creation