HIGH Powershell Activity - 3083271452

Detected (Reported) ID: #1916 | Detected: 2026-01-02 11:58:20 | Malware
Alert Overview

Dynamic Powershell download and execution from the CLI

Unclassified
XDR Agent
New
DS:PANW/XDR Agent DOM:Security
Host Information
BOOK-R0BE6S1NC3
ubuntu
00:72:ee:3e:51:84
Process Information Process Execution
Actor Process (Executor)
Process Name wscript.exe
Path C:\Windows\System32\wscript.exe
PID 19004
SHA256 5919e37adbf233d1aadf793959eeeb7d1eba073b23b3572016564b407f0ad93f VT
MD5 58e6467c1780f739edfd7df2c6bc74bf
Signature Microsoft Corporation Signed
"wscript.exe" "C:\app\cortex-xdr-siem-test\xdr_hidden_runner.vbs" --once
Parent Process (Causality)
Process Name wscript.exe
Path C:\Windows\System32\wscript.exe
SHA256 5919e37adbf233d1aadf793959eeeb7d1eba073b23b3572016564b407f0ad93f VT
"wscript.exe" "C:\app\cortex-xdr-siem-test\xdr_hidden_runner.vbs" --once
Severity Analysis
HIGH

High priority investigation needed

Summary
Events 1
IP Addresses 2
Tags 2
File Artifacts Yes
Network Artifacts No
Registry Artifacts No
Analyst Verdict