phn8-secondary.z9.web.core.windows.net
Open in
urlscan Pro
20.150.40.142
Malicious Activity!
Public Scan
Effective URL: https://phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-85532-42855
Submission: On November 08 via api from JP — Scanned from CA
Summary
TLS certificate: Issued by Microsoft Azure RSA TLS Issuing CA 07 on October 30th 2024. Valid for: 6 months.
This is the only time phn8-secondary.z9.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
28 | 20.150.40.142 20.150.40.142 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
1 | 15.204.213.5 15.204.213.5 | 16276 (OVH) (OVH) | |
30 | 4 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
phn8-secondary.z9.web.core.windows.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
28 |
windows.net
phn8-secondary.z9.web.core.windows.net |
963 KB |
1 |
ipwho.is
ipwho.is — Cisco Umbrella Rank: 59835 |
965 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 791 |
27 KB |
30 | 3 |
Domain | Requested by | |
---|---|---|
28 | phn8-secondary.z9.web.core.windows.net |
phn8-secondary.z9.web.core.windows.net
|
1 | ipwho.is |
phn8-secondary.z9.web.core.windows.net
|
1 | code.jquery.com |
phn8-secondary.z9.web.core.windows.net
|
30 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure RSA TLS Issuing CA 07 |
2024-10-30 - 2025-04-28 |
6 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
ipwho.is GoGetSSL ECC DV CA |
2024-03-13 - 2025-03-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-85532-42855
Frame ID: D0A701EC88DAE23C5B4D799B8AE2483E
Requests: 31 HTTP requests in this frame
Screenshot
Page Title
コンピューターエラPage URL History Show full URLs
- https://phn8-secondary.z9.web.core.windows.net/?bcda=%280101%29-85532-42855 Page URL
- https://phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-85532-42855 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://phn8-secondary.z9.web.core.windows.net/?bcda=%280101%29-85532-42855 Page URL
- https://phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-85532-42855 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
30 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
phn8-secondary.z9.web.core.windows.net/ |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
17 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tapa.css
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.4.4.min.js
code.jquery.com/ |
77 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
noir.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
82 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
537 KB 537 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boxc.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
47 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bx1.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
321 B 321 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mnc.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
187 B 557 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
168 B 538 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bel.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
276 B 646 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
set.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
364 B 734 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vsc.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
722 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pcm.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dm.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
332 B 702 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cs.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nvidia.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jupiter.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
503 B 879 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
340 B 716 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
esc.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
99 B 474 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
caps.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
509 B 885 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
escs.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
63 B 438 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safes.js
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
662 B 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
ipwho.is/ |
693 B 965 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
349 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aud0jp87.mp3
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
226 KB 226 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ai2.mp3
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
168 B 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w3.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w1.png
phn8-secondary.z9.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| t function| hdjwhuhyywtwygjnjkdqbcnkdkjiui string| bcda function| toggleFullScreen function| addEvent string| ipadd string| city string| country string| isp string| currtime function| win_onkeydown_handler number| isNS function| mischandler function| mousehandler0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ipwho.is
phn8-secondary.z9.web.core.windows.net
15.204.213.5
20.150.40.142
2a04:4e42::649
08d1ccb3d6e3dd14d552358776e9b8f2ea4bda80fbb3d886e7c693dfe178af03
104a4bf876e7435973f11a8b6e9bc0450bdb9cf58bc9a5e1c19c84094987ed78
1ab5ef4e7e196cb1ff39df44e1a0a39f6880b906ef6fd6da3cfdbb92ffd33115
318698ae5e67c32550d6b40ac09848d598f6317f51a8f09638ba925f6e7cc479
31c6dbe9d867436244f38566adad57e3870f4c8489c6804280eb564bfac5c1bd
44f752b0bd2e48052d538bc6aca5379f3630ca64da945f794690ddf47e8eaef7
466835ef2d6f0f0bfddafa405154702e36a5588f69684dd3b6642f9013eb778b
46b5242c5eb6b3b71ef2606f2d0d700142ae58b53c6d018e6bf06bab62437e1b
4b436b0b6a47db85c88f83dc3fe3fd9a96c0a4018b28832165df929dffe0bc86
4c1606563842cce5f1788329d4417ae3618b33c6365c56a7122439b6ab45c977
517364f2d45162fb5037437b5b6cb953d00d9b2b3b79ba87d9fe57ea6ee6070c
601c07d864e6e9054e74748e9a19f37b11fbb5c72b84957c6bc94a8ac44e7d2f
73310aa233204005c5d97ccd8b6c8c06dda83205f1de6571aa798400fb5bedeb
783f038d361f7cd0b0b364e21ee84e2e97254f2f3cdb9c92644311310266bf38
7df9f467d23ee1887edb2123cca10a1a9c4624cdcf7199c64e78a8430031f9f5
8a9ce8981a3fc753b747cf19e37bce2994a445660c018d3f51ec4fd0f0554884
9ef2602fcae68fc8b5139967a5c4acbff66e9ab8904666e4aa400254d02c7a33
a05c3bd2fbf83d737847db662dc40abb2f5e822cf1a5406e52f8e1794b87b10e
aed058881b2fe6dd4f59cf5a713c20625fa984053978d5404a1108d6c451b0b4
afe332157f4efe355f3181284e99f4331c4d19703ed1678b5316d2933f95e98e
b13a03e0db893734298cbe203bf264407636ffe5dab0a141f83c492d0034dd6a
b67a7c07a045d7cb0f2e216a557aec0d99405e17c36d1a6b1ff3e2733aa35348
c5a324f181af16879b6c4c52b731b23392f2816def159b157c4de620cff1cd41
c5ffcc4225ec5405003b01f60620b747e3f5c3ea52c944e617c93f684cffdd07
d45930d0f751d60da70a4948a3f29bd91e5495a8fa480b7842a221b5284dc274
e3a8cebfbfeeb5d546b3f958b83a0371024436eef276133832ce697be3f81284
e615d0be3cbb400f0490c0cf8c7079cefb16f29c8b6296b049bbfc46328b34b8
e61abc51286f36b0bd8d49d5b1c6f32bbbda4b03f4df220c5ba9ad489ae3e8c1
f1b8fccc39a3f506027d2db7cbcdd0a43af551b9eb92982c08491fab8d7b9ab5