andreas-dot-firm-structure-344407.uk.r.appspot.com
Open in
urlscan Pro
2a00:1450:400d:80d::2014
Malicious Activity!
Public Scan
Effective URL: https://andreas-dot-firm-structure-344407.uk.r.appspot.com/
Submission: On February 08 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1C3 on January 9th 2023. Valid for: 3 months.
This is the only time andreas-dot-firm-structure-344407.uk.r.appspot.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2a00:1450:400... 2a00:1450:400d:80d::2014 | 15169 (GOOGLE) (GOOGLE) | |
3 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
1 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
2 | 2620:1ec:a92:... 2620:1ec:a92::156 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 1 | 2603:1026:c0d... 2603:1026:c0d:81a::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2603:1026:c0d... 2603:1026:c0d:802::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2603:1020:802... 2603:1020:802:3::91 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a02:26f0:f70... 2a02:26f0:f700:4::212:4f15 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
10 | 7 |
ASN15169 (GOOGLE, US)
andreas-dot-firm-structure-344407.uk.r.appspot.com |
ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
www.office.com | |
www.microsoft365.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
outlook.office365.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
outlook.office.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
webshell.suite.office.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
office.com
www.office.com — Cisco Umbrella Rank: 2172 outlook.office.com — Cisco Umbrella Rank: 77 webshell.suite.office.com — Cisco Umbrella Rank: 427 |
4 KB |
3 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1157 |
101 KB |
2 |
appspot.com
1 redirects
andreas-dot-firm-structure-344407.uk.r.appspot.com |
15 KB |
1 |
office.net
res-1.cdn.office.net — Cisco Umbrella Rank: 424 |
80 KB |
1 |
microsoft365.com
www.microsoft365.com — Cisco Umbrella Rank: 29052 |
992 B |
1 |
office365.com
1 redirects
outlook.office365.com — Cisco Umbrella Rank: 44 |
3 KB |
1 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 3646 |
2 KB |
10 | 7 |
Domain | Requested by | |
---|---|---|
3 | aadcdn.msftauth.net |
andreas-dot-firm-structure-344407.uk.r.appspot.com
|
2 | andreas-dot-firm-structure-344407.uk.r.appspot.com | 1 redirects |
1 | res-1.cdn.office.net |
webshell.suite.office.com
|
1 | www.microsoft365.com |
www.office.com
|
1 | webshell.suite.office.com |
andreas-dot-firm-structure-344407.uk.r.appspot.com
|
1 | outlook.office.com |
andreas-dot-firm-structure-344407.uk.r.appspot.com
|
1 | outlook.office365.com | 1 redirects |
1 | www.office.com |
andreas-dot-firm-structure-344407.uk.r.appspot.com
|
1 | logincdn.msauth.net |
andreas-dot-firm-structure-344407.uk.r.appspot.com
|
10 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.appspot.com GTS CA 1C3 |
2023-01-09 - 2023-04-03 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2022-04-01 - 2023-04-01 |
a year | crt.sh |
identitycdn.msauth.net Microsoft Azure TLS Issuing CA 06 |
2022-08-23 - 2023-08-18 |
a year | crt.sh |
portal.office.com Microsoft Azure TLS Issuing CA 02 |
2022-08-29 - 2023-08-24 |
a year | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2022-07-26 - 2023-07-25 |
a year | crt.sh |
webshell.suite.office.com Microsoft Azure TLS Issuing CA 05 |
2022-09-29 - 2023-09-24 |
a year | crt.sh |
*.res.outlook.com DigiCert SHA2 Secure Server CA |
2022-11-15 - 2023-11-15 |
a year | crt.sh |
This page contains 5 frames:
Primary Page:
https://andreas-dot-firm-structure-344407.uk.r.appspot.com/
Frame ID: 7BAEE38000053C0AEBA35CB05C683028
Requests: 5 HTTP requests in this frame
Frame:
https://www.office.com/logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: 251752E16321680DAFB948E8FDA68E08
Requests: 1 HTTP requests in this frame
Frame:
https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
Frame ID: 4DE1876CC95AF3E837C54E65661A60F3
Requests: 1 HTTP requests in this frame
Frame:
https://webshell.suite.office.com/iframe/TokenFactoryIframe/Logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: BB07AB8CA75719F0772B0EB58603DF4E
Requests: 2 HTTP requests in this frame
Frame:
https://www.microsoft365.com/logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363&from=logout
Frame ID: 0EE730D7D126CB1EB233475C715AA46B
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Sign outPage URL History Show full URLs
-
http://andreas-dot-firm-structure-344407.uk.r.appspot.com/
HTTP 302
https://andreas-dot-firm-structure-344407.uk.r.appspot.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://andreas-dot-firm-structure-344407.uk.r.appspot.com/
HTTP 302
https://andreas-dot-firm-structure-344407.uk.r.appspot.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://outlook.office365.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363 HTTP 302
- https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
andreas-dot-firm-structure-344407.uk.r.appspot.com/ Redirect Chain
|
52 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_59_uuouser7hrkmvbaz1jw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
106 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.1.11.min__yok_chwseypwbmuffnnaa2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
109 KB 38 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_ynywyfekfmsp3ljup2epra2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
176 KB 44 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout
www.office.com/ Frame 2517 |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logoff.aspx
outlook.office.com/owa/auth/ Frame 4DE1 Redirect Chain
|
263 B 2 KB |
Document
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Logout
webshell.suite.office.com/iframe/TokenFactoryIframe/ Frame BB07 |
416 B 934 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout
www.microsoft365.com/ Frame 0EE7 |
1 KB 992 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
suiteux.shell.msaltokenfactoryiframe.c8ed55a2f40c1d5f04e9.js
res-1.cdn.office.net/shellux/ Frame BB07 |
412 KB 80 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)31 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| oncontentvisibilityautostatechange function| $ function| jQuery object| jQuery111209736162876478913 undefined| MSLogin undefined| proxy undefined| ErrorCodes undefined| Constants undefined| Context undefined| Background undefined| Logo undefined| Instrument undefined| User undefined| tenant_info undefined| MSLogout undefined| ThirdPartyCookieStates undefined| PostType undefined| LoginOption undefined| TenantBranding undefined| users undefined| Tiles object| $Debug object| imageStatusArray boolean| imageStatusTimeout object| updatedUsers number| msaSignoutStatus object| msaSignoutTimerId boolean| iframeStatusTimeout6 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.office.com/ | Name: OH.SID Value: 4f1d31d7-d50b-4209-8302-0960882f5236 |
|
www.office.com/ | Name: OH.DCAffinity Value: OH-weu |
|
www.office.com/ | Name: OH.FLID Value: 5637443f-1037-4301-8cc8-8a4117be1ddb |
|
www.microsoft365.com/ | Name: OH.SID Value: 40dedc13-ae08-452e-b18c-fef9e544a237 |
|
www.microsoft365.com/ | Name: OH.DCAffinity Value: OH-weu |
|
www.microsoft365.com/ | Name: OH.FLID Value: 11333e97-c444-44a6-9e46-f428a6c5c6ac |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
andreas-dot-firm-structure-344407.uk.r.appspot.com
logincdn.msauth.net
outlook.office.com
outlook.office365.com
res-1.cdn.office.net
webshell.suite.office.com
www.microsoft365.com
www.office.com
152.199.23.37
192.229.221.185
2603:1020:802:3::91
2603:1026:c0d:802::2
2603:1026:c0d:81a::2
2620:1ec:a92::156
2a00:1450:400d:80d::2014
2a02:26f0:f700:4::212:4f15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