URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://attachments.office.net/owa/[email protected]/service.svc/s/GetFileAttachment?id=AAMkADVjMjE0ZWQ5LTI5ODMtNGJkNS1iNTI0LTE3ODg3NmUzYWQ0NABGAAAAAADbWg17V8TNS5dm8iZQb/fCBwASX1wobC3pQpdlcvVE+M/7AAAAAAEMAAASX1wobC3pQpdlcvVE+M/7AACTTccuAAABEgAQAO+HTGYPKZhLuprapy4H7js=&token=eyJhbGciOiJSUzI1NiIsImtpZCI6IjczRkI5QkJFRjYzNjc4RDRGN0U4NEI0NDBCQUJCMTJBMzM5RDlGOTgiLCJ0eXAiOiJKV1QiLCJ4NXQiOiJjX3VidnZZMmVOVDM2RXRFQzZ1eEtqT2RuNWcifQ.eyJvcmlnaW4iOiJodHRwczovL291dGxvb2sub2ZmaWNlLmNvbSIsInVjIjoiNGEyYzk2MmMxYWQzNGNiMGF
Resource
win10v2004-20230703-en
General
-
Target
http://attachments.office.net/owa/[email protected]/service.svc/s/GetFileAttachment?id=AAMkADVjMjE0ZWQ5LTI5ODMtNGJkNS1iNTI0LTE3ODg3NmUzYWQ0NABGAAAAAADbWg17V8TNS5dm8iZQb/fCBwASX1wobC3pQpdlcvVE+M/7AAAAAAEMAAASX1wobC3pQpdlcvVE+M/7AACTTccuAAABEgAQAO+HTGYPKZhLuprapy4H7js=&token=eyJhbGciOiJSUzI1NiIsImtpZCI6IjczRkI5QkJFRjYzNjc4RDRGN0U4NEI0NDBCQUJCMTJBMzM5RDlGOTgiLCJ0eXAiOiJKV1QiLCJ4NXQiOiJjX3VidnZZMmVOVDM2RXRFQzZ1eEtqT2RuNWcifQ.eyJvcmlnaW4iOiJodHRwczovL291dGxvb2sub2ZmaWNlLmNvbSIsInVjIjoiNGEyYzk2MmMxYWQzNGNiMGF
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]