Cortex Pop-ups Triggered for StoreDesktopExtension.exe Despite Being Blocklisted

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Cortex Pop-ups Triggered for StoreDesktopExtension.exe Despite Being Blocklisted

Users are continuing to receive Cortex alert pop-ups for StoreDesktopExtension.exe even after the executable was added to the Cortex block list.

Observations:

  • The file is already present in the Cortex block list.

  • Alerts/pop-ups are still being triggered on user endpoints

  • Is it related to Windows Security Update?
  • Restarting the machine is resolving the issue. However, post that the "Windows Store App" cannot be accessed
2 REPLIES 2

L5 Sessionator

Hi @J.Fernando795842 ,

 

this was a known issue where the wildfire detection engine has got updates from threat intel about specific Hash related to this application and was flagged malicious. However, this was immediately reverted and the effects on the tenant may last a few hours. Inorder to prevent business impact, you can consider adding the SHA256 to allow list for the time being and remove it later. 

 

Hope this helps. Please mark the response as "Accepted as Solution" if helps

Hi,
Known false positive: StoreDesktopExtension.exe is legit MS Store component, flagged by Cortex behavioral rules during updates/servicing.

Block list stops execution but not BIOC alerts/pop-ups. Restart clears cache temporarily, but can break Store if quarantined earlier.

Fix:

Exceptions > Add File exception:
Allow

Path: *StoreDesktopExtension.exe
Or full: C:\Program Files\WindowsApps\Microsoft.WindowsStore_**\StoreDesktopExtension.exe
Add SHA256 from alert

In alerts/incidents: close as FP > suppress rule for this hash/behavior
Force sync: host > Response > Refresh Policy
(or endpoint: cytool checkin)

If Store broken: run wsreset.exe or reset via PowerShell:

Get-AppXPackage WindowsStore -AllUsers | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register "$($_.InstallLocation)\AppXManifest.xml"}

Alerts stop after sync. If not, send BIOC ID / SHA256 / agent version, I'll script the exact suppression.

Guilherme Lucas
Senior Security Researcher | Red Team / Exploit Dev

Principal Security Researcher | Offensive & Defensive Cyber Operations | PCAP Whisperer | 0-day Hunter | Certified Ethical Hacker & Forensics Specialist
  • 2269 Views
  • 2 replies
  • 1 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!