Windows Compatability Telemetry (COMPATTELRUNNER.EXE)
Hello all,
Anybody also see this? I's blocked every day once. I asume some Telemetry function.
Greetings from snowy Switzerland 😉
Windows 10 PRO or ENT different version from 1709 to 1909. (ENG or GER)
ENS 10.7.0.2174
content: 10.6.0.11030
AMCORE: 6200.9189
--------------------------------------------------
Module Name:
Threat Prevention
Analyzer Content Creation Date:
1/7/21 11:41:16 PM CET
Analyzer Content Version:
10.6.0.11030
Analyzer Rule ID:
8003
Analyzer Rule Name:
Fileless Threat: Suspicious Powershell Behavior Detected
Source Description:
powershell.exe -ExecutionPolicy Restricted -Command $Res = 0; if((Get-WindowsOptionalFeature -Online -FeatureName IIS-WebServerRole).State -eq 'Enabled') { $Path = $env:windir + '\system32\inetsrv\config\applicationHost.Config'; if (Test-Path -Path $Path) { try { [XML]$Xml = Get-Content $Path } catch { $Res = 1 } }; } Write-Host 'Final result:',$Res
Target Hash:
cda48fc75952ad12d99e526d0b6bf70a
Target Signed:
Yes
Target Signer:
CN=MICROSOFT WINDOWS, O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US
Target Parent Process Signed:
Yes
Target Parent Process Signer:
C=US, S=WASHINGTON, L=REDMOND, O=MICROSOFT CORPORATION, CN=MICROSOFT WINDOWS
Target Parent Process Name:
COMPATTELRUNNER.EXE
Target Parent Process Hash:
339de473e8bd33b6a31c264285efc034
Target Name:
POWERSHELL.EXE
Target Path:
C:\WINDOWS\SYSTEM32\WINDOWSPOWERSHELL\V1.0
Hi @bretzeli ,
It appears to be something related to IIS. Not sure if its telemetry though.
Is there a time frame when this happens?
Thanks
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
Every day one since 03/04.02.2021. Most in the night. That seems to be when it started. Did McAfee change that rule then or MS something?
This is BEFORE the 02/2021 Patchday and we did no approve any 02/2021 MS patches before 11.02.2021 from February.
One machine the Mcafee event 04:00 and at the time absolue noting BEFORE 04:00 in Application, Security, Setup or System in eventviewer. No Schedule Task special at that time
But COMPATTELRUNNER.EXE is temetry and we see new files around 04:00:28 on that machine localy
C:\Windows\appcompat\UA\C:\Windows\appcompat\UA
C:\Windows\appcompat\appraiser\APPRAISER_TelemetryBaseline_21H2.bin
05:04, 03:54, 04:34, 04:19
So customer and partner concludes THAT this is a false positive. 😉
Please fix or tell us if this is fixed in 02/2021 Release of ENS.
Hello,
Rule 8003
03.05.2021, Still same problem with ATP Module on German W10 1909.
Any from McAfee inersted in this SINCE all customer have to MOVE to ENS?
Greetings from Switzerland big McAfee Partner
Module Name: | Threat Prevention |
Analyzer Content Creation Date: | 4/6/21 3:34:22 AM CEST |
Analyzer Content Version: | 10.6.0.11299 |
Analyzer Rule ID: | 8003 |
Analyzer Rule Name: | Fileless Threat: Suspicious Powershell Behavior Detected |
Source Description: | powershell.exe -ExecutionPolicy Restricted -Command $Res = 0; if((Get-WindowsOptionalFeature -Online -FeatureName IIS-WebServerRole).State -eq 'Enabled') { $Path = $env:windir + '\system32\inetsrv\config\applicationHost.Config'; if (Test-Path -Path $Path) { try { [XML]$Xml = Get-Content $Path } catch { $Res = 1 } }; } Write-Host 'Final result:',$Res |
Target Hash: | cda48fc75952ad12d99e526d0b6bf70a |
Target Signed: | Yes |
Target Signer: | CN=MICROSOFT WINDOWS, O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US |
Target Parent Process Signed: | Yes |
Target Parent Process Signer: | C=US, S=WASHINGTON, L=REDMOND, O=MICROSOFT CORPORATION, CN=MICROSOFT WINDOWS |
Target Parent Process Name: | COMPATTELRUNNER.EXE |
Target Parent Process Hash: | 339de473e8bd33b6a31c264285efc034 |
Target Name: | POWERSHELL.EXE |
Target Path: | C:\WINDOWS\SYSTEM32\WINDOWSPOWERSHELL\V1.0 |
Target File Size (Bytes): | 451584 |
Target Modify Time: | 3/19/19 6:46:56 AM CET |
Target Access Time: | 3/19/19 6:46:56 AM CET |
Target Create Time: | 3/19/19 6:46:56 AM CET |
API Name: | SetEnvironmentVariableW |
First Action Status: | Not available |
Second Action Status: | Not available |
Description: | ExP:Illegal API Use was detected as an attempt to exploit C:\WINDOWS\SYSTEM32\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE, which targeted the SetEnvironmentVariableW API. It wasn't blocked because Exploit Prevention was set to Report Only. |
Attack Vector Type: | Local System |
Adaptive Threat Protection Events |
Hello @bretzeli
Please note by default, this Signature ID 8003 is Set to Low.
If you wish to have this rule enabled, please add exclusion as below and monitor if that resolves your issue.
Note: please make sure you are creating a duplicate EP policy and test this on a couple of systems before applying this policy on all the machines.
Exclusions:
Exclusion Type: Illegal API Use - Buffer Overflow
Process
Name: POWERSHELL.EXE
File name or path (can include * or ? wildcards): C:\WINDOWS\SYSTEM32\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE
Caller Module
Name: COMPATTELRUNNER.EXE
MD5 hash: 339de473e8bd33b6a31c264285efc034
API
Name: SetEnvironmentVariableW
Signatures
Signatures ID (comma-separated): 8003
Thanks
Hello,
Yeah turn it off as always the best solution?
Ahh, Common 😉
First thank you for showing a possible solution. Custom IPS rules as mentioned need to be tested and if faulty take out the whole environment at once... (So we know how but never a good solution we think)
1) Why is the RULE only low? Do you cover that already in another module like ATP better?
2) From our side as partner > We will have to change that on 23 existing EPO customers. Why don't you include that in the next RULE update for all customer? Since it's nothing else than a BUG when it catches a Windows Update Patch from Microsoft.
For 2) we in general have a problem with catching up in distribution of the rules to all our customers.
We need a tool or solution for all EPO on Premise customers our side where we can:
a) Define a set of STANDARD Exploit Rules which will pull for all customers
b) Then a set of CUSTOMER Exploit rules that may cover special needs per customer EPO
Then we simply miss a solution Mcafee Partner side where we can manage the IPS Rules at once for all customer. Like there is change or we see a False/Positive in a rule like now AND we want to change that asap for all customers.
If Mcafee does not provide such a tool in near future we will begin developing such a solution for ours elf.
Grettings from Switzerland
Thank you for your response, yes your points make sense, however, that is something which can be clarified by working with McAfee technical support, I would request you to raise an SR with McAfee Technical Support so that probably, the engineer can take your points and work with the EP team to have this addressed. in the upcoming EP content updates.
https://support.mcafee.com/webcenter/portal/supportportal/pages_home?pageTemplate=null
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: