HIGH Script Engine Activity - 2431936258

Detected (Reported) ID: #190 | Detected: 2025-12-31 15:18:20 | Malware
Alert Overview

Suspicious script engine activity

Unclassified
XDR Agent
New
DS:PANW/XDR Agent DOM:Security
Host Information
BOOK-R0BE6S1NC3
SYSTEM
00:72:ee:3e:51:84
Process Information Process Execution
Actor Process (Executor)
Process Name powershell.exe
Path C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3048
SHA256 0ff6f2c94bc7e2833a5f7e16de1622e5dba70396f31c7d5f56381870317e8c46 VT
MD5 a97e6573b97b44c96122bfa543a82ea1
Signature Microsoft Corporation Signed
"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\AtomicRedTeam\atomic-random-runner-v2.ps1" -TestCount 3 -Silent
Parent Process (Causality)
Process Name powershell.exe
Path C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
SHA256 0ff6f2c94bc7e2833a5f7e16de1622e5dba70396f31c7d5f56381870317e8c46 VT
"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\AtomicRedTeam\atomic-random-runner-v2.ps1" -TestCount 3 -Silent
Severity Analysis
HIGH

High priority investigation needed

Summary
Events 1
IP Addresses 1
Tags 2
File Artifacts Yes
Network Artifacts No
Registry Artifacts No
Analyst Verdict