selcobw-dot-azure-projectfiles.uk.r.appspot.com
Open in
urlscan Pro
2404:6800:4004:812::2014
Malicious Activity!
Public Scan
Effective URL: https://selcobw-dot-azure-projectfiles.uk.r.appspot.com/
Submission: On February 03 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by GTS CA 1C3 on January 9th 2023. Valid for: 3 months.
This is the only time selcobw-dot-azure-projectfiles.uk.r.appspot.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2404:6800:400... 2404:6800:4004:812::2014 | 15169 (GOOGLE) (GOOGLE) | |
3 | 152.199.39.242 152.199.39.242 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2620:1ec:4f:1... 2620:1ec:4f:1::46 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 2620:1ec:a92:... 2620:1ec:a92::156 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 1 | 2603:1046:c09... 2603:1046:c09:10f2::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2603:1046:c09... 2603:1046:c09:19a9::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2603:1046:140... 2603:1046:1402:1::1 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2600:140b:a80... 2600:140b:a800::17c3:5952 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
10 | 7 |
ASN15169 (GOOGLE, US)
selcobw-dot-azure-projectfiles.uk.r.appspot.com |
ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
www.office.com | |
www.microsoft365.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
outlook.office365.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
webshell.suite.office.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
office.com
www.office.com — Cisco Umbrella Rank: 2172 outlook.office.com — Cisco Umbrella Rank: 77 webshell.suite.office.com — Cisco Umbrella Rank: 427 |
4 KB |
3 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1157 |
101 KB |
2 |
appspot.com
1 redirects
selcobw-dot-azure-projectfiles.uk.r.appspot.com |
15 KB |
1 |
microsoft365.com
www.microsoft365.com — Cisco Umbrella Rank: 29052 |
991 B |
1 |
office.net
res-1.cdn.office.net — Cisco Umbrella Rank: 424 |
80 KB |
1 |
office365.com
1 redirects
outlook.office365.com — Cisco Umbrella Rank: 44 |
3 KB |
1 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 3646 |
2 KB |
10 | 7 |
Domain | Requested by | |
---|---|---|
3 | aadcdn.msftauth.net |
selcobw-dot-azure-projectfiles.uk.r.appspot.com
|
2 | selcobw-dot-azure-projectfiles.uk.r.appspot.com | 1 redirects |
1 | www.microsoft365.com |
www.office.com
|
1 | res-1.cdn.office.net |
webshell.suite.office.com
|
1 | webshell.suite.office.com |
selcobw-dot-azure-projectfiles.uk.r.appspot.com
|
1 | outlook.office.com |
selcobw-dot-azure-projectfiles.uk.r.appspot.com
|
1 | outlook.office365.com | 1 redirects |
1 | www.office.com |
selcobw-dot-azure-projectfiles.uk.r.appspot.com
|
1 | logincdn.msauth.net |
selcobw-dot-azure-projectfiles.uk.r.appspot.com
|
10 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.appspot.com GTS CA 1C3 |
2023-01-09 - 2023-04-03 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2022-04-01 - 2023-04-01 |
a year | crt.sh |
identitycdn.msauth.net Microsoft Azure TLS Issuing CA 05 |
2023-01-04 - 2023-12-30 |
a year | crt.sh |
portal.office.com Microsoft Azure TLS Issuing CA 02 |
2022-08-29 - 2023-08-24 |
a year | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2022-07-26 - 2023-07-25 |
a year | crt.sh |
webshell.suite.office.com Microsoft Azure TLS Issuing CA 05 |
2022-09-29 - 2023-09-24 |
a year | crt.sh |
*.res.outlook.com DigiCert SHA2 Secure Server CA |
2022-11-15 - 2023-11-15 |
a year | crt.sh |
This page contains 5 frames:
Primary Page:
https://selcobw-dot-azure-projectfiles.uk.r.appspot.com/
Frame ID: 63FC0638F0B7C5CD1B11370A464D99FF
Requests: 5 HTTP requests in this frame
Frame:
https://www.office.com/logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: EC5DECFC554332AC3578E8B001B74E94
Requests: 1 HTTP requests in this frame
Frame:
https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
Frame ID: 5027C6E61BF16CA489F184CB659AE955
Requests: 1 HTTP requests in this frame
Frame:
https://webshell.suite.office.com/iframe/TokenFactoryIframe/Logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: 6A5CD5E1193406FFDA7C59253BC966EF
Requests: 2 HTTP requests in this frame
Frame:
https://www.microsoft365.com/logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363&from=logout
Frame ID: 94447CBB4286F79B258AD6C29A88A9B3
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Sign outPage URL History Show full URLs
-
http://selcobw-dot-azure-projectfiles.uk.r.appspot.com/
HTTP 302
https://selcobw-dot-azure-projectfiles.uk.r.appspot.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://selcobw-dot-azure-projectfiles.uk.r.appspot.com/
HTTP 302
https://selcobw-dot-azure-projectfiles.uk.r.appspot.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://outlook.office365.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363 HTTP 302
- https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
selcobw-dot-azure-projectfiles.uk.r.appspot.com/ Redirect Chain
|
52 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_59_uuouser7hrkmvbaz1jw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
106 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.1.11.min__yok_chwseypwbmuffnnaa2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
109 KB 38 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_ynywyfekfmsp3ljup2epra2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
176 KB 43 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout
www.office.com/ Frame EC5D |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logoff.aspx
outlook.office.com/owa/auth/ Frame 5027 Redirect Chain
|
263 B 2 KB |
Document
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Logout
webshell.suite.office.com/iframe/TokenFactoryIframe/ Frame 6A5C |
421 B 939 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
suiteux.shell.msaltokenfactoryiframe.c8ed55a2f40c1d5f04e9.js
res-1.cdn.office.net/shellux/ Frame 6A5C |
412 KB 80 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout
www.microsoft365.com/ Frame 9444 |
1 KB 991 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)31 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| oncontentvisibilityautostatechange function| $ function| jQuery object| jQuery11120976605544563717 undefined| MSLogin undefined| proxy undefined| ErrorCodes undefined| Constants undefined| Context undefined| Background undefined| Logo undefined| Instrument undefined| User undefined| tenant_info undefined| MSLogout undefined| ThirdPartyCookieStates undefined| PostType undefined| LoginOption undefined| TenantBranding undefined| users undefined| Tiles object| $Debug object| imageStatusArray boolean| imageStatusTimeout object| updatedUsers number| msaSignoutStatus object| msaSignoutTimerId boolean| iframeStatusTimeout6 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.office.com/ | Name: OH.SID Value: 9c7422ee-14de-4114-88fa-399b42205165 |
|
www.office.com/ | Name: OH.DCAffinity Value: OH-ejp |
|
www.office.com/ | Name: OH.FLID Value: 0db7e148-1390-4f17-bad0-c2a6b06760a4 |
|
www.microsoft365.com/ | Name: OH.SID Value: ec33d9e8-3f31-4363-a35d-a3906fa5dda9 |
|
www.microsoft365.com/ | Name: OH.DCAffinity Value: OH-ejp |
|
www.microsoft365.com/ | Name: OH.FLID Value: 5ba2ad8c-9102-464c-bd9d-217826f0bcd5 |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
logincdn.msauth.net
outlook.office.com
outlook.office365.com
res-1.cdn.office.net
selcobw-dot-azure-projectfiles.uk.r.appspot.com
webshell.suite.office.com
www.microsoft365.com
www.office.com
152.199.39.242
2404:6800:4004:812::2014
2600:140b:a800::17c3:5952
2603:1046:1402:1::1
2603:1046:c09:10f2::2
2603:1046:c09:19a9::2
2620:1ec:4f:1::46
2620:1ec:a92::156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