dfadf2433dfsdfsdfsd.z23.web.core.windows.net
Open in
urlscan Pro
20.150.86.129
Malicious Activity!
Public Scan
Effective URL: https://dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/index.html
Submission: On August 30 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by Microsoft Azure RSA TLS Issuing CA 04 on April 19th 2024. Valid for: a year.
This is the only time dfadf2433dfsdfsdfsd.z23.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2600:140b:1c0... 2600:140b:1c00:47::1734:8ca4 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 2 | 172.67.206.214 172.67.206.214 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
20 | 20.150.86.129 20.150.86.129 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 172.67.208.186 172.67.208.186 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
22 | 4 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
dfadf2433dfsdfsdfsd.z23.web.core.windows.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
windows.net
dfadf2433dfsdfsdfsd.z23.web.core.windows.net |
1 MB |
2 |
jcai66.com
2 redirects
jcai66.com |
1 KB |
1 |
userstatics.com
userstatics.com — Cisco Umbrella Rank: 303208 |
674 B |
1 |
bing.com
www.bing.com — Cisco Umbrella Rank: 65 |
3 KB |
22 | 4 |
Domain | Requested by | |
---|---|---|
20 | dfadf2433dfsdfsdfsd.z23.web.core.windows.net |
www.bing.com
dfadf2433dfsdfsdfsd.z23.web.core.windows.net |
2 | jcai66.com | 2 redirects |
1 | userstatics.com |
dfadf2433dfsdfsdfsd.z23.web.core.windows.net
|
1 | www.bing.com | |
22 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
r.bing.com Microsoft Azure ECC TLS Issuing CA 04 |
2024-06-24 - 2025-06-19 |
a year | crt.sh |
*.web.core.windows.net Microsoft Azure RSA TLS Issuing CA 04 |
2024-04-19 - 2025-04-14 |
a year | crt.sh |
userstatics.com WE1 |
2024-07-24 - 2024-10-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/index.html
Frame ID: D474410427A7544237F9B338F4316DDA
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
システムセキュリティPage URL History Show full URLs
- https://www.bing.com/aclick?ld=e8Qec9r76DwCtB1HYf9DWeLjVUCUxLv0wa6evHRycuMaBt-1sEtuRV-k16fujlVYtG... Page URL
-
https://jcai66.com/iframe?url=https%3A%2F%2Fwww.rakuten.co.jp%2Fcategory%2F&type=1&msclkid=264a...
HTTP 301
https://jcai66.com/iframe/?url=https%3A%2F%2Fwww.rakuten.co.jp%2Fcategory%2F&type=1&msclkid=264... HTTP 302
https://dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ Page URL
- https://dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/index.html Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.bing.com/aclick?ld=e8Qec9r76DwCtB1HYf9DWeLjVUCUxLv0wa6evHRycuMaBt-1sEtuRV-k16fujlVYtGzMW27Z3RPdIctbEfLm1yF85AuXRTKvSb3VdKFpiLfIg-diXrq9oTdfq5BQFgPMRHsyV1mKRpdZPME6jItWa9xSf5kaFOfZEbGJZraVpXX-IBjGiYVPYAU-N0UDLHKnIffzPNmQ&u=aHR0cHMlM2ElMmYlMmZqY2FpNjYuY29tJTJmaWZyYW1lJTNmdXJsJTNkaHR0cHMlMjUzQSUyNTJGJTI1MkZ3d3cucmFrdXRlbi5jby5qcCUyNTJGY2F0ZWdvcnklMjUyRiUyNnR5cGUlM2QxJTI2bXNjbGtpZCUzZDI2NGE1NDk2M2RiMTFlMjdhZDY1MzI0NzBlNTdiOTE5&rlid=264a54963db11e27ad6532470e57b919&ntb=1 Page URL
-
https://jcai66.com/iframe?url=https%3A%2F%2Fwww.rakuten.co.jp%2Fcategory%2F&type=1&msclkid=264a54963db11e27ad6532470e57b919
HTTP 301
https://jcai66.com/iframe/?url=https%3A%2F%2Fwww.rakuten.co.jp%2Fcategory%2F&type=1&msclkid=264a54963db11e27ad6532470e57b919 HTTP 302
https://dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ Page URL
- https://dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://jcai66.com/iframe?url=https%3A%2F%2Fwww.rakuten.co.jp%2Fcategory%2F&type=1&msclkid=264a54963db11e27ad6532470e57b919 HTTP 301
- https://jcai66.com/iframe/?url=https%3A%2F%2Fwww.rakuten.co.jp%2Fcategory%2F&type=1&msclkid=264a54963db11e27ad6532470e57b919 HTTP 302
- https://dfadf2433dfsdfsdfsd.z23.web.core.windows.net/
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
aclick
www.bing.com/ |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ Redirect Chain
|
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/ |
39 KB 39 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tapa.css
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/css/ |
20 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/css/ |
216 KB 216 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/js/ |
83 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/js/ |
59 KB 59 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/css/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
emojione.min.js
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/js/ |
295 KB 296 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.compat.js
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/js/ |
1 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f24.png
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
244 KB 244 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mnc.png
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
187 B 557 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
168 B 538 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
set.png
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
364 B 734 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vsc.png
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
722 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bel.png
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
276 B 646 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dm.png
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/images/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
349 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
beep.mp3
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/media/ |
8 KB 9 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jp.mp3
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04/media/ |
108 KB 109 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ |
335 B 673 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
script.js
userstatics.com/get/ |
133 B 674 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
181 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| bootstrap function| chat function| showd2 function| beep1 number| isNS function| mischandler function| mousehandler function| win_onkeydown_handler function| addEvent function| plausible object| emojione5 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dfadf2433dfsdfsdfsd.z23.web.core.windows.net/ErW0ind0SmW0Security04 | Name: PHPREFS Value: full |
|
.bing.com/ | Name: _EDGE_S Value: F=1&SID=387DABE9D02D6E141893BF02D1286FC8 |
|
.bing.com/ | Name: _EDGE_V Value: 1 |
|
.bing.com/ | Name: MUID Value: 007BFD8D66EA6A2A1BB8E96667EF6BE7 |
|
jcai66.com/ | Name: __ode Value: U0RCMFVGWlpPVlZHZDFvNGIzWTFiRFI2VG5ad1NHazNNbk5xVlhvMk5FRnRhVXN2WjNwcWFIUlFkWFZ0YmxWQk1UZDFUbGMxWVc5UlUwNHZZVnByWmc9PQ%3D%3D |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dfadf2433dfsdfsdfsd.z23.web.core.windows.net
jcai66.com
userstatics.com
www.bing.com
172.67.206.214
172.67.208.186
20.150.86.129
2600:140b:1c00:47::1734:8ca4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