Malicious behavior was detected A Deny Action was applied
The application wscript.exe attempted to execute fileless content that contains highly suspicious Privilege Escalation techniques. A Terminate policy action was applied.
The application powershell.exe attempted to execute fileless content that contains known malware. This content performs highly suspicious process injection behavior. A Deny policy action was applied.
This script performs highly suspicious process injection behavior.
AMSI_PROCESS_INJECTION mitre_t1055_process_inject
Applications at path: <Path_to_Parent>\<Parent_Process> Operation attempt: Performs any operation Action: Bypass