westscapes.mycustomerconnect.com
Open in
urlscan Pro
52.34.207.165
Malicious Activity!
Public Scan
Effective URL: https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=5c6449f2e3544f08ce8fa9...
Submission: On February 18 via manual from US
Summary
TLS certificate: Issued by Trustwave Organization Validation SHA... on June 25th 2019. Valid for: a year.
This is the only time westscapes.mycustomerconnect.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 62.90.225.13 62.90.225.13 | 1680 (NV-ASN CE...) (NV-ASN CELLCOM ltd.) | |
1 1 | 91.222.9.108 91.222.9.108 | 198047 (UKWEB-EQX) (UKWEB-EQX) | |
3 7 | 52.34.207.165 52.34.207.165 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 152.199.23.72 152.199.23.72 | 15133 (EDGECAST) (EDGECAST) | |
6 | 2 |
ASN198047 (UKWEB-EQX, GB)
PTR: platodedi.servers.eqx.misp.co.uk
www.mcgirrengineering.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-34-207-165.us-west-2.compute.amazonaws.com
westscapes.mycustomerconnect.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
mycustomerconnect.com
3 redirects
westscapes.mycustomerconnect.com |
107 KB |
2 |
msauthimages.net
aadcdn.msauthimages.net |
214 KB |
1 |
mcgirrengineering.com
1 redirects
www.mcgirrengineering.com |
679 B |
1 |
emekyizrael.org.il
1 redirects
www.emekyizrael.org.il |
369 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
7 | westscapes.mycustomerconnect.com |
3 redirects
westscapes.mycustomerconnect.com
|
2 | aadcdn.msauthimages.net |
westscapes.mycustomerconnect.com
|
1 | www.mcgirrengineering.com | 1 redirects |
1 | www.emekyizrael.org.il | 1 redirects |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.mycustomerconnect.com Trustwave Organization Validation SHA256 CA, Level 1 |
2019-06-25 - 2020-07-02 |
a year | crt.sh |
aadcdn.msauthimages.net Microsoft IT TLS CA 1 |
2018-12-07 - 2020-12-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=5c6449f2e3544f08ce8fa927d7429a4f&cmd&id=5c6449f2e3544f08ce8fa927d7429a4f5c6449f2e3544f08ce8fa927d7429a4f&session=5c6449f2e3544f08ce8fa927d7429a4f5c6449f2e3544f08ce8fa927d7429a4f&auThz_=andrew.foos@dnr.state.oh.us&idd=5c6449f2e3544f08ce8fa927d7429a4f
Frame ID: 9EF5775DC96A3127BE9F02EDFF3221A3
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.emekyizrael.org.il/redir.asp?url=http:%2F%2Fwww.mcgirrengineering.com%2F0ff1ce%2F%3Fcontact%26u...
HTTP 302
http://www.mcgirrengineering.com/0ff1ce/?contact&us=andrew.foos@dnr.state.oh.us HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/?cgi-portal=2371068e5e5c21f658ea28c... HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/?csrftoken=submit_authenticati... HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate?csrftoken=5c6... HTTP 301
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=5c... Page URL
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
Windows Server (Operating Systems) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.emekyizrael.org.il/redir.asp?url=http:%2F%2Fwww.mcgirrengineering.com%2F0ff1ce%2F%3Fcontact%26us%3Dandrew.foos@dnr.state.oh.us&
HTTP 302
http://www.mcgirrengineering.com/0ff1ce/?contact&us=andrew.foos@dnr.state.oh.us HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/?cgi-portal=2371068e5e5c21f658ea28cc81a8e8d2|2371068e5e5c21f658ea28cc81a8e8d2&auThz_=andrew.foos@dnr.state.oh.us&2371068e5e5c21f658ea28cc81a8e8d2=2371068e5e5c21f658ea28cc81a8e8d2 HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/?csrftoken=submit_authentication&id=995647e723c6569a385365c17cb0d089995647e723c6569a385365c17cb0d089&session=995647e723c6569a385365c17cb0d089995647e723c6569a385365c17cb0d089&auThz_=andrew.foos@dnr.state.oh.us&idd=995647e723c6569a385365c17cb0d089 HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate?csrftoken=5c6449f2e3544f08ce8fa927d7429a4f&cmd&id=5c6449f2e3544f08ce8fa927d7429a4f5c6449f2e3544f08ce8fa927d7429a4f&session=5c6449f2e3544f08ce8fa927d7429a4f5c6449f2e3544f08ce8fa927d7429a4f&auThz_=andrew.foos@dnr.state.oh.us&idd=5c6449f2e3544f08ce8fa927d7429a4f HTTP 301
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=5c6449f2e3544f08ce8fa927d7429a4f&cmd&id=5c6449f2e3544f08ce8fa927d7429a4f5c6449f2e3544f08ce8fa927d7429a4f&session=5c6449f2e3544f08ce8fa927d7429a4f5c6449f2e3544f08ce8fa927d7429a4f&auThz_=andrew.foos@dnr.state.oh.us&idd=5c6449f2e3544f08ce8fa927d7429a4f Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/ Redirect Chain
|
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/css/ |
99 KB 100 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bannerlogo
aadcdn.msauthimages.net/dbd5a2dd-vxxw985js4f-huhhainvtrerf8mtbr6tryz2mhecaqy/logintenantbranding/0/ |
41 KB 41 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
513 B 809 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white_ellipsis.svg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
illustration
aadcdn.msauthimages.net/dbd5a2dd-vxxw985js4f-huhhainvtrerf8mtbr6tryz2mhecaqy/logintenantbranding/0/ |
172 KB 173 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online) Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauthimages.net
westscapes.mycustomerconnect.com
www.emekyizrael.org.il
www.mcgirrengineering.com
152.199.23.72
52.34.207.165
62.90.225.13
91.222.9.108
10c50b88ebf99fdf813a4cce86ba218a6e2ea3d266146520529f1e1bddc5ebd3
11d10f3ef56cb6fbed5f9c2db201f5d055e3ea26325a8eb006653f629f0981ff
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
62f54dddf4a77a19d8a4544182ed4c59ded25f2a60d8e60d0fa7bc5e6fdb70cf
c9e5899a57b248c563a3d324ac7978fb8ab52e333eaee7461264d2b78e2fd518