
Summary
This detection rule identifies potential misuse of the "RemoteFXvGPUDisablement.exe" binary through monitoring PowerShell module creation events. Specifically, it looks for instances where the module contents include `function Get-VMRemoteFXPhysicalVideoAdapter`, which may indicate an attempt to exploit a known vulnerability related to module load-order hijacking. The rule aims to catch dark activities that could suggest nefarious intentions using PowerShell to manipulate virtual graphics processing resources (vGPU) in Windows environments. The detection leverages logging from classic PowerShell instances running on Windows and establishes high severity due to its potential as a precursor to more serious attacks on virtual infrastructures.
Categories
- Windows
- Cloud
- Endpoint
Data Sources
- Logon Session
- Process
- Application Log
ATT&CK Techniques
- T1218
Created: 2021-07-13