<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Compatibility Appraiser — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-compatibility-appraiser/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:41:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-compatibility-appraiser/feed.xml" rel="self" type="application/rss+xml"/><item><title>TelemetryController Scheduled Task Hijack for Persistence</title><link>https://feed.craftedsignal.io/briefs/2026-05-telemetrycontroller-hijack/</link><pubDate>Tue, 12 May 2026 18:41:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-telemetrycontroller-hijack/</guid><description>The rule detects the hijack of the Microsoft Compatibility Appraiser scheduled task to establish persistence with system integrity level, by monitoring CompatTelRunner.exe process execution and detecting unexpected child processes.</description><content:encoded><![CDATA[<p>This rule detects a persistence technique that abuses the Microsoft Compatibility Appraiser scheduled task (CompatTelRunner.exe) to execute arbitrary code with SYSTEM privileges. Attackers can hijack this task by modifying registry values associated with the TelemetryController, causing CompatTelRunner.exe to launch malicious executables. This allows for a persistent presence on the system, bypassing traditional security measures by leveraging a legitimate Windows component. The attack relies on manipulating the expected behavior of the telemetry service to execute attacker-controlled code with elevated privileges. Detection focuses on identifying child processes of CompatTelRunner.exe that are not standard Windows utilities, indicating a potential compromise. This technique is significant because it enables attackers to maintain persistence even after system reboots, and the use of a trusted process makes it harder to detect.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker modifies registry keys under <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController</code> to point to a malicious executable or script.</li>
<li>The Microsoft Compatibility Appraiser scheduled task (CompatTelRunner.exe) is triggered, either manually or through its regular schedule.</li>
<li>CompatTelRunner.exe, due to the modified registry values, launches the attacker-controlled executable with SYSTEM privileges using the <code>-cv</code> flag to pass control.</li>
<li>The malicious executable executes, performing actions such as installing malware, establishing a reverse shell, or exfiltrating sensitive data.</li>
<li>The attacker may further modify the system to ensure the malicious executable is launched persistently.</li>
<li>The attacker leverages the elevated privileges gained to perform lateral movement or other malicious activities on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack allows the threat actor to establish persistent access to the compromised system with SYSTEM privileges. This can lead to a wide range of malicious activities, including data theft, installation of ransomware, or using the compromised system as a foothold for further attacks within the network. The high integrity level of the hijacked process grants the attacker significant control over the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture <code>event.type == &quot;start&quot;</code> and <code>process.parent.name : &quot;CompatTelRunner.exe&quot;</code> to enable the rules below.</li>
<li>Deploy the Sigma rule &ldquo;Persistence via TelemetryController Scheduled Task Hijack&rdquo; to your SIEM and tune for your environment to detect unexpected child processes of CompatTelRunner.exe.</li>
<li>Monitor registry modifications to <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController</code> to detect unauthorized changes to telemetry settings.</li>
<li>Investigate any processes launched by CompatTelRunner.exe with command-line arguments containing <code>-cv</code> that are not standard Windows utilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>persistence</category><category>scheduled_task</category><category>telemetry</category><category>windows</category></item></channel></rss>