Detectionhightest

Potential RemoteFXvGPUDisablement.EXE Abuse

Detects PowerShell module creation where the module Contents are set to "function Get-VMRemoteFXPhysicalVideoAdapter". This could be a sign of potential abuse of the "RemoteFXvGPUDisablement.exe" binary which is known to be vulnerable to module load-order hijacking.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
François Hubaut, Nasreddine Bencherchali (Nextron Systems)Created Tue Jul 13Updated Tue May 09f65e22f9-819e-4f96-9c7b-498364ae7a25windows
Log Source
Windowspowershell-classic
ProductWindows← raw: windows
Servicepowershell-classic← raw: powershell-classic

Definition

fields have to be extract from event

Detection Logic
Detection Logic1 selector
detection:
    selection:
        Data|contains: 'ModuleContents=function Get-VMRemoteFXPhysicalVideoAdapter {'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
f65e22f9-819e-4f96-9c7b-498364ae7a25
Status
test
Level
high
Type
Detection
Created
Tue Jul 13
Modified
Tue May 09
Path
rules/windows/powershell/powershell_classic/posh_pc_remotefxvgpudisablement_abuse.yml
Raw Tags
attack.defense-evasionattack.t1218
View on GitHub