heroui logo

RemoteFXvGPUDisablement Abuse Via AtomicTestHarnesses

Sigma Rules

View Source
Summary
This detection rule identifies attempts to exploit the 'RemoteFXvGPUDisablement.exe' by monitoring calls made to the AtomicTestHarnesses via the 'Invoke-ATHRemoteFXvGPUDisablementCommand'. The key technique involved here is module load-order hijacking that allows adversaries to execute unauthorized PowerShell commands under the guise of legitimate operations. The rule targets command line executions that contain specific strings associated with this malicious activity. By allowing tracking such command invocations, security teams can recognize potential breaches facilitated through this attack vector. This rule is especially important in environments utilizing virtualization technologies, where RemoteFX may be deployed. The detection mechanism focuses on a process creation log source, making it critical for Windows-based systems monitoring process activities where this variant of attack might manifest. Overall, effective detection requires correlation with known behavioral patterns associated with exploitation scenarios outlined in references provided, which detail further on its implications and operational context.
Categories
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1218
Created: 2021-07-13