asq15-secondary.z28.web.core.windows.net
Open in
urlscan Pro
20.150.19.36
Malicious Activity!
Public Scan
Effective URL: https://asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-24910
Submission: On March 14 via api from JP — Scanned from FR
Summary
TLS certificate: Issued by Microsoft Azure TLS Issuing CA 05 on February 1st 2024. Valid for: 5 months.
This is the only time asq15-secondary.z28.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
26 | 20.150.19.36 20.150.19.36 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 217.20.112.104 217.20.112.104 | 28753 (LEASEWEB-...) (LEASEWEB-DE-FRA-10) | |
1 | 188.114.97.3 188.114.97.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
28 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
asq15-secondary.z28.web.core.windows.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
windows.net
asq15-secondary.z28.web.core.windows.net |
2 MB |
1 |
userstatics.com
userstatics.com — Cisco Umbrella Rank: 75655 |
715 B |
1 |
rdtk.io
m03lm.rdtk.io — Cisco Umbrella Rank: 102961 |
|
28 | 3 |
Domain | Requested by | |
---|---|---|
26 | asq15-secondary.z28.web.core.windows.net |
asq15-secondary.z28.web.core.windows.net
|
1 | userstatics.com |
asq15-secondary.z28.web.core.windows.net
|
1 | m03lm.rdtk.io |
asq15-secondary.z28.web.core.windows.net
|
28 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure TLS Issuing CA 05 |
2024-02-01 - 2024-06-27 |
5 months | crt.sh |
*.rdtk.io GoGetSSL RSA DV CA |
2023-07-19 - 2024-07-19 |
a year | crt.sh |
userstatics.com E1 |
2024-01-29 - 2024-04-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-24910
Frame ID: 020B83800A1E3C06E5349F1DA83077AB
Requests: 28 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://asq15-secondary.z28.web.core.windows.net/?bcda=%280101%29-88868-24910 Page URL
- https://asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-24910 Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://asq15-secondary.z28.web.core.windows.net/?bcda=%280101%29-88868-24910 Page URL
- https://asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-24910 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
asq15-secondary.z28.web.core.windows.net/ |
1 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/ |
23 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/css/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/css/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg1.jpg
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
537 KB 537 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg2.jpg
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
452 KB 452 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
postback
m03lm.rdtk.io/ |
0 0 |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
minimize.jpg
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kxFy-clip.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
542 B 912 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qsbs-firewall.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
920 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s-S4-acc.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
813 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Z5BR-network.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
607 B 977 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uZbx-si.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
-EBq-current.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nOxp-sett.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
463 B 833 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cross.png
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
377 KB 378 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/images/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/js/ |
83 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/js/ |
59 KB 59 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/js/ |
1 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/js/ |
464 B 840 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Fm7-alert.mp3
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/media/ |
80 KB 0 |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
speech.mp3
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/media/ |
340 B 699 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Fm7-alert.mp3
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4UabrENHsxJlGDuGo1OIlLU94YtzCwY.woff2
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/fonts/ |
21 KB 22 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
userstatics.com/get/ |
133 B 715 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML/fonts/ |
65 KB 65 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| jkdhasjkhdgwqhgehkqgweyuodq string| bcda function| $ function| jQuery object| bootstrap function| startScan function| playSound1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
asq15-secondary.z28.web.core.windows.net/werrx01USAHTML | Name: PHPREFS Value: full |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
asq15-secondary.z28.web.core.windows.net
m03lm.rdtk.io
userstatics.com
188.114.97.3
20.150.19.36
217.20.112.104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