Hypervisor
Ring -1DdiMon-based Intel VT-x hypervisor providing EPT shadow hooks for transparent syscall monitoring. Detects injection attempts at the lowest level.
Requirements
- • Intel VT-x — AMD processors not supported
- • Hyper-V disabled — Cannot run nested
- • Bare metal only — No VM support
Overview
The hypervisor uses Intel VT-x Extended Page Tables (EPT) to create shadow hooks on syscalls. This allows monitoring without modifying kernel code, making it invisible to most detection methods.
- • EPT hooks — Execute-only pages with shadow copies
- • Transparent — No kernel code modification
- • Ring -1 — Runs below the kernel
- • Event push — Events sent to main driver ring buffer
How EPT Hooks Work
- 1Hypervisor creates a shadow copy of the target page
- 2Original page is marked execute-only in EPT
- 3Shadow page contains the hook (jump to handler)
- 4Execution uses shadow page, reads use original page
- 5Handler logs the event and returns to original code
Monitored Syscalls
| Syscall | Purpose | Detection |
|---|---|---|
NtWriteVirtualMemory | Write to process memory | Cross-process injection |
Additional syscalls can be hooked by extending the hypervisor configuration.
Features
Usage
- Ensure Hyper-V is disabled in Windows Features
- Start the DioIPS application
- Enable the hypervisor from the Dashboard
- View hypervisor events in the Hypervisor tab
- Cross-process write attempts will be logged