<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Powershell Command in Registry Data in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4965057#M8001</link>
    <description>&lt;P&gt;We have multiple customers and this only pops up for users of a specific customer (specific org). TAC says it's fixed with the latest definition updates but it's not. I have sent them some data and they are investigating.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Nov 2023 14:44:15 GMT</pubDate>
    <dc:creator>Jatrki</dc:creator>
    <dc:date>2023-11-23T14:44:15Z</dc:date>
    <item>
      <title>Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4922490#M7807</link>
      <description>&lt;P&gt;&lt;SPAN&gt;For the last few hours we have been seeing an increasing number of 'Powershell command in registry data' findings.&lt;BR /&gt;They all look the same and report something similar:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;STRONG&gt;Observables&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;File:&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;taskhostw.exe&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;e6370920…58402728&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Registry Key:&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;\USER\S-1-5-21-1514197063-1296195755-1265796959-7856\SOFTWARE\Microsoft\Windows\CurrentVersion\AppListBackup\ListOfTaskBackedUpTiles_2361862998&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; ListOfTaskBackedUpTiles_2360852998&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;STRONG&gt;Observed Activity&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Registry Set&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;\USER\S-1-5-21-1514197063-1296195755-1265796959-7856\SOFTWARE\Microsoft\Windows\CurrentVersion\AppListBackup\ListOfTaskBackedUpTiles_2361862998&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;I assume this is nothing to worry about? Is there a way to prevent this particular alert message or do we have to wait for a signature update?&lt;/DIV&gt;</description>
      <pubDate>Wed, 13 Sep 2023 05:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4922490#M7807</guid>
      <dc:creator>Bunged</dc:creator>
      <dc:date>2023-09-13T05:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4923262#M7809</link>
      <description>&lt;P&gt;No nothing to worry but it obviously looks like the behavioral monitoring mapped the way it was added to known tactics and techniques. Is there a new or updated group policy up and running that manipulates existing scheduled tasks? Not sure but I thought there's a way to mute alerts the get triggered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 07:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4923262#M7809</guid>
      <dc:creator>0x23MW</dc:creator>
      <dc:date>2023-09-14T07:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4924097#M7821</link>
      <description>&lt;P&gt;We have opened a TAC on this. They are still investigating but it seems that more than one customer has been affected.&lt;BR /&gt;I am curious about the cause of this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 12:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4924097#M7821</guid>
      <dc:creator>Bunged</dc:creator>
      <dc:date>2023-09-15T12:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4924151#M7822</link>
      <description>&lt;P&gt;By now it seems to get evolving with the last ms windows updates (patchday)...:-D&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 14:20:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4924151#M7822</guid>
      <dc:creator>0x23MW</dc:creator>
      <dc:date>2023-09-15T14:20:19Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4928798#M7829</link>
      <description>&lt;P&gt;Did Cisco get back to you on this?&amp;nbsp; I started seeing this in our environment this morning.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 13:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4928798#M7829</guid>
      <dc:creator>mark.e</dc:creator>
      <dc:date>2023-09-25T13:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4928808#M7830</link>
      <description>&lt;P&gt;No, not yet. We opened a TAC almost two weeks ago, but got no response other than "we're investigating"... 🤷‍&lt;span class="lia-unicode-emoji" title=":male_sign:"&gt;♂️&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 13:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4928808#M7830</guid>
      <dc:creator>Bunged</dc:creator>
      <dc:date>2023-09-25T13:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4930300#M7837</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;Just wondering if you have heard anything yet? I have had a couple of alerts for the same issue.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 12:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4930300#M7837</guid>
      <dc:creator>IIIC</dc:creator>
      <dc:date>2023-09-27T12:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4930705#M7839</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;Sep 22: "Talos is currently working on improving the indicators of compromise. Unfortunately I do not have information about estimated time of putting this on production, but once I found out I will let you know immediately."&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Sep 27: "&lt;SPAN&gt;Engineering already improved the signatures so you should not see such False Positives anymore. Please confirm that everything is fine regarding this issue."&lt;BR /&gt;&lt;BR /&gt;So supposedly it's fixed, but we're still getting alerts today...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 07:08:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4930705#M7839</guid>
      <dc:creator>Bunged</dc:creator>
      <dc:date>2023-09-28T07:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4930763#M7840</link>
      <description>&lt;P&gt;Thanks for the info, fingers crossed it's fixed.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 09:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4930763#M7840</guid>
      <dc:creator>IIIC</dc:creator>
      <dc:date>2023-09-28T09:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4939268#M7888</link>
      <description>&lt;P&gt;We still see those alerts. Does anyone have news?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 14:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4939268#M7888</guid>
      <dc:creator>sloeffler</dc:creator>
      <dc:date>2023-10-12T14:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4939359#M7889</link>
      <description>&lt;P&gt;We are still getting the alerts even though TAC has assured us several times that the problem is really fixed now... &lt;span class="lia-unicode-emoji" title=":face_with_rolling_eyes:"&gt;🙄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 16:39:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4939359#M7889</guid>
      <dc:creator>Bunged</dc:creator>
      <dc:date>2023-10-12T16:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4949081#M7944</link>
      <description>&lt;P&gt;This popped&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Registry Set&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;\USER\S-1-5--blablalba\SOFTWARE\Microsoft\Windows\CurrentVersion\AppListBackup\ListOfTaskBackedUpTiles_1794425386&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;2023-10-26&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;03:48:27&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;EDT&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;We have sysmon and whatever installed. No PowerShell around the time. &lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 26 Oct 2023 16:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4949081#M7944</guid>
      <dc:creator>ventaran</dc:creator>
      <dc:date>2023-10-26T16:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4954270#M7964</link>
      <description>&lt;P&gt;I saw this on one of our hosts 10 times in the last month:&lt;/P&gt;
&lt;P&gt;Registry Key: &lt;STRONG&gt;\USER\S-1-5-21-3581115410-45963113-3647916999-49065\SOFTWARE\Microsoft\Windows\CurrentVersion\AppListBackup\TotalListOfLastBackedUpTiles_2343873105&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Let's hope this really is fixed.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 14:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4954270#M7964</guid>
      <dc:creator>mski7861</dc:creator>
      <dc:date>2023-11-06T14:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4963747#M7990</link>
      <description>&lt;P&gt;Still continuing to pop up for us, only a couple workstations though. Last one was on November 18th on version 8.1.3.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 14:19:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4963747#M7990</guid>
      <dc:creator>ebarbarian99</dc:creator>
      <dc:date>2023-11-21T14:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4965057#M8001</link>
      <description>&lt;P&gt;We have multiple customers and this only pops up for users of a specific customer (specific org). TAC says it's fixed with the latest definition updates but it's not. I have sent them some data and they are investigating.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 14:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4965057#M8001</guid>
      <dc:creator>Jatrki</dc:creator>
      <dc:date>2023-11-23T14:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4965680#M8004</link>
      <description>&lt;P&gt;Did Cisco say what version of the connector this was fixed in?&amp;nbsp; The latest?&amp;nbsp; Or did the signature get fixed for all versions of the connector?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 14:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4965680#M8004</guid>
      <dc:creator>mski7861</dc:creator>
      <dc:date>2023-11-24T14:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4966142#M8007</link>
      <description>&lt;P&gt;It looks the same here. We receive 5-10 alerts per day on this topic. Is there any news from Cisco or has someone already opened a new TAC?&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2023 07:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4966142#M8007</guid>
      <dc:creator>RalphNelson</dc:creator>
      <dc:date>2023-11-25T07:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4993071#M8070</link>
      <description>&lt;P&gt;I only had 2 PCs that were constantly impacted with these false positives since October.&amp;nbsp; Finally got with support, Cisco TAC recommended pushing the impacted workstations to version 8.2.1, and so far, I've not seen the issue crop up again for them for the last week.&lt;/P&gt;&lt;P&gt;I would take note there are a few community posts about 8.2.1 creating other problems, such as errors or high memory usage.&amp;nbsp; Definitely test before doing a complete rollout.&amp;nbsp; Good luck!&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 21:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4993071#M8070</guid>
      <dc:creator>ebarbarian99</dc:creator>
      <dc:date>2024-01-09T21:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4993073#M8071</link>
      <description>&lt;P&gt;See my other post above.&amp;nbsp; Version 8.2.1 seems to be the only fix in my situation. Had no luck between versions 8.1.3 - 8.1.7.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 21:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4993073#M8071</guid>
      <dc:creator>ebarbarian99</dc:creator>
      <dc:date>2024-01-09T21:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: Powershell Command in Registry Data</title>
      <link>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4993792#M8089</link>
      <description>&lt;P&gt;Same here.&amp;nbsp; Once I updated our connectors to&amp;nbsp;8.2.1.21650 the events subsided.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 17:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/powershell-command-in-registry-data/m-p/4993792#M8089</guid>
      <dc:creator>mski7861</dc:creator>
      <dc:date>2024-01-10T17:37:23Z</dc:date>
    </item>
  </channel>
</rss>

