URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://login.microsoftonline.com/9652d7c2-1ccf-4940-8151-4a92bd474ed0/oauth2/authorize?client_id=4660504c-45b3-4674-a709-71951a6b0763&redirect_uri=https%3A%2F%2Finvitations.microsoft.com&response_type=id_token&scope=openid%20profile&state=OpenIdConnect.AuthenticationProperties%3DDRYgnC9aCEjK5O5bK5C6imhlwnxVGYyJmRP6UkHNKi_Dga1Zj0BcJb97Ur0H99EZPq3-7T0-WOUJzjbT60hDBpbSiHxFaAzWIqyeGDFOKJVj3SmNYTzHN7vwmfbAQZQwTB1NswsmlHFi-xILC45uAB_ai_IAwob60U1-je0SZLKincvXcs25UfqiUyi7KkyjHTIUbeHSMMMqYUIBJyo7PJoy0bHd2AOMKWn19PldzIvnVt7k48tb08M_php69Bc4blT9HKd3MnqFQ7QtSoNePD-hAnDt2LsT_CgaNC44fJxgLpMUGlSEmXSLXd1wxGDyDspC5thVLVBtEeR1JZaxEBV_sGfAiojNvMr9BgmJDpt0rFQSvkyvPbjYxq4iB73Mb9oT8u97yFml0mZZMc0mDGTIuI8S9Y7p47QeNxx6hGnk0pVtkJVyuJcQfiPelXYb1muB7nxjid3Ec0QHHbLM7aEZRXIrzAU4gYMYcqFCnBtS2-g4CEkBiESRAwczYWxDBaS-ddTm1MAjBrg_PXRVpdazCBHKBvy8xe-P5r0v20DVezvwI91fCBiLuowMlQb6V-HhzkOGfD3EzcOk5pkRXBgX5X5Fr2f4eTXZRXGL_Au7jqiKZSGe8xrJ3E1pt1l2GmLIJk--7eiJ4nmrII-cAbqDXvEf0V8tPMRZnVnUYsw1MH4qIj38HpiCFUyG2XNWZhJGy2UjSAIotQWD_YdPnfiZNVWe_6PAA-nEWaGBv2c&response_mode=form_post&nonce=82a91f94-4a43-4113-8278-eb9150289454&lc=3082&login_hint=mtoja%40mbsistemas.es&invite_redirect_url=https%3A%2F%2Faccount.activedirectory.windowsazure.com%2F%3Ftenantid%3D9652d7c2-1ccf-4940-8151-4a92bd474ed0&x-client-SKU=ID_NET461&x-client-ver=6.27.0.0
Resource
win10-20231215-en
General
-
Target
https://login.microsoftonline.com/9652d7c2-1ccf-4940-8151-4a92bd474ed0/oauth2/authorize?client_id=4660504c-45b3-4674-a709-71951a6b0763&redirect_uri=https%3A%2F%2Finvitations.microsoft.com&response_type=id_token&scope=openid%20profile&state=OpenIdConnect.AuthenticationProperties%3DDRYgnC9aCEjK5O5bK5C6imhlwnxVGYyJmRP6UkHNKi_Dga1Zj0BcJb97Ur0H99EZPq3-7T0-WOUJzjbT60hDBpbSiHxFaAzWIqyeGDFOKJVj3SmNYTzHN7vwmfbAQZQwTB1NswsmlHFi-xILC45uAB_ai_IAwob60U1-je0SZLKincvXcs25UfqiUyi7KkyjHTIUbeHSMMMqYUIBJyo7PJoy0bHd2AOMKWn19PldzIvnVt7k48tb08M_php69Bc4blT9HKd3MnqFQ7QtSoNePD-hAnDt2LsT_CgaNC44fJxgLpMUGlSEmXSLXd1wxGDyDspC5thVLVBtEeR1JZaxEBV_sGfAiojNvMr9BgmJDpt0rFQSvkyvPbjYxq4iB73Mb9oT8u97yFml0mZZMc0mDGTIuI8S9Y7p47QeNxx6hGnk0pVtkJVyuJcQfiPelXYb1muB7nxjid3Ec0QHHbLM7aEZRXIrzAU4gYMYcqFCnBtS2-g4CEkBiESRAwczYWxDBaS-ddTm1MAjBrg_PXRVpdazCBHKBvy8xe-P5r0v20DVezvwI91fCBiLuowMlQb6V-HhzkOGfD3EzcOk5pkRXBgX5X5Fr2f4eTXZRXGL_Au7jqiKZSGe8xrJ3E1pt1l2GmLIJk--7eiJ4nmrII-cAbqDXvEf0V8tPMRZnVnUYsw1MH4qIj38HpiCFUyG2XNWZhJGy2UjSAIotQWD_YdPnfiZNVWe_6PAA-nEWaGBv2c&response_mode=form_post&nonce=82a91f94-4a43-4113-8278-eb9150289454&lc=3082&login_hint=mtoja%40mbsistemas.es&invite_redirect_url=https%3A%2F%2Faccount.activedirectory.windowsazure.com%2F%3Ftenantid%3D9652d7c2-1ccf-4940-8151-4a92bd474ed0&x-client-SKU=ID_NET461&x-client-ver=6.27.0.0
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]