
Summary
This detection rule targets potential abuses of the RemoteFXvGPUDisablement.exe binary by monitoring the creation of PowerShell modules where the contents explicitly include the function definition for Get-VMRemoteFXPhysicalVideoAdapter. It indicates that the system may be vulnerable to module load-order hijacking, a technique that can allow attackers to execute malicious code through legitimate binaries. The rule triggers when a PowerShell module is detected with the specified content, which could be a precursor to malicious behavior leveraging the aforementioned executable. Understanding this threat is crucial as it implicates an attack vector that exploits a known vulnerability in the RemoteFX functionality, which can compromise system integrity and security.
Categories
- Endpoint
- Windows
Data Sources
- Script
- Process
- Application Log
ATT&CK Techniques
- T1218
Created: 2021-07-13