heroui logo

Potential RemoteFXvGPUDisablement.EXE Abuse - PowerShell Module

Sigma Rules

View Source
Summary
This detection rule targets potential abuses of the RemoteFXvGPUDisablement.exe binary by monitoring the creation of PowerShell modules where the contents explicitly include the function definition for Get-VMRemoteFXPhysicalVideoAdapter. It indicates that the system may be vulnerable to module load-order hijacking, a technique that can allow attackers to execute malicious code through legitimate binaries. The rule triggers when a PowerShell module is detected with the specified content, which could be a precursor to malicious behavior leveraging the aforementioned executable. Understanding this threat is crucial as it implicates an attack vector that exploits a known vulnerability in the RemoteFX functionality, which can compromise system integrity and security.
Categories
  • Endpoint
  • Windows
Data Sources
  • Script
  • Process
  • Application Log
ATT&CK Techniques
  • T1218
Created: 2021-07-13