HIGH Script Engine Activity - 2431936258
Detected (Reported)
ID: #119
|
Detected: 2025-12-31 13:18:20
|
Malware
Alert Overview
Suspicious script engine activity
Unclassified
XDR Agent
New
DS:PANW/XDR Agent
DOM:Security
Host Information
Process Information
Process Execution
Actor Process (Executor)
| Process Name | powershell.exe |
|---|---|
| Path | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID | 20932 |
| SHA256 |
0ff6f2c94bc7e2833a5f7e16de1622e5dba70396f31c7d5f56381870317e8c46
VT
|
| MD5 | a97e6573b97b44c96122bfa543a82ea1 |
| Signature | Microsoft Corporation N/A |
"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\AtomicRedTeam\atomic-random-runner-v2.ps1" -TestCount 3 -Silent
Severity Analysis
HIGH
High priority investigation needed
Summary
Events
1
IP Addresses
1
Tags
2
File Artifacts
Yes
Network Artifacts
No
Registry Artifacts
No
Analyst Verdict