456l4j56l4k5j6l342fgg.z13.web.core.windows.net
Open in
urlscan Pro
20.60.134.225
Malicious Activity!
Public Scan
Effective URL: https://456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/index.html
Submission: On January 29 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by Microsoft RSA TLS CA 01 on September 27th 2023. Valid for: a year.
This is the only time 456l4j56l4k5j6l342fgg.z13.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
24 | 20.60.134.225 20.60.134.225 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
1 | 103.126.138.87 103.126.138.87 | 40676 (AS40676) (AS40676) | |
26 | 4 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
456l4j56l4k5j6l342fgg.z13.web.core.windows.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
24 |
windows.net
456l4j56l4k5j6l342fgg.z13.web.core.windows.net |
2 MB |
1 |
ipwho.is
ipwho.is — Cisco Umbrella Rank: 68028 |
930 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
27 KB |
26 | 3 |
Domain | Requested by | |
---|---|---|
24 | 456l4j56l4k5j6l342fgg.z13.web.core.windows.net |
456l4j56l4k5j6l342fgg.z13.web.core.windows.net
|
1 | ipwho.is |
456l4j56l4k5j6l342fgg.z13.web.core.windows.net
|
1 | code.jquery.com |
456l4j56l4k5j6l342fgg.z13.web.core.windows.net
|
26 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft RSA TLS CA 01 |
2023-09-27 - 2024-09-27 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
ipwho.is GoGetSSL ECC DV CA |
2023-04-05 - 2024-04-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/index.html
Frame ID: 7AD4A9225987CF93105D133523BDC7C9
Requests: 27 HTTP requests in this frame
Screenshot
Page Title
コンピュータエラーコードPage URL History Show full URLs
- https://456l4j56l4k5j6l342fgg.z13.web.core.windows.net/ Page URL
- https://456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/index.html Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://456l4j56l4k5j6l342fgg.z13.web.core.windows.net/ Page URL
- https://456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
26 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/ |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
43 KB 44 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.4.4.min.js
code.jquery.com/ |
77 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fOAEtxGe.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
377 KB 378 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iBKXUGLJ.gif
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
10 KB 10 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Qx04OaNz.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
19 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TkF9Lz32.gif
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
16 KB 17 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
321 B 321 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4diplyOb.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
187 B 557 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sq3EKe7b.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
168 B 538 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NwiS6ye0.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
364 B 734 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GSpJNubo.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
722 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
70640Xt4.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
97 KB 97 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
S6VviujC.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
276 B 646 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
JOFtLDyO.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ZizdQssn.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
332 B 702 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wjDJc0aN.png
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wtwmZ68o.gif
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nUp0oxfz.js
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
3 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wDL2BB7Q.js
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
483 B 868 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lcZXR5lx.js
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
86 B 470 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
ipwho.is/ |
658 B 930 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
349 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
AC8WLjyg.jpg
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
2 MB 2 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b8p3g2pE.mp3
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
112 KB 0 |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ai2.mp3
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
321 B 0 |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtBay93a.mp4
456l4j56l4k5j6l342fgg.z13.web.core.windows.net/v4O3K08g/ |
8 KB 9 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| t function| getVariableFromURl string| ph0ne string| ipadd string| city string| country string| isp string| currtime function| toggleFullScreen function| addEvent object| modal object| btn object| span number| e number| isNS function| mischandler function| mousehandler function| win_onkeydown_handler0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
456l4j56l4k5j6l342fgg.z13.web.core.windows.net
code.jquery.com
ipwho.is
103.126.138.87
20.60.134.225
2a04:4e42:400::649
0589be7715d2320e559eae6bd26f3528e97450c70293da2e1e8ce45f77f99ab1
194eadf5256ef009355ac4525507a36bb4d4f8c40530bc96fed468e27d484140
1ab5ef4e7e196cb1ff39df44e1a0a39f6880b906ef6fd6da3cfdbb92ffd33115
31c6dbe9d867436244f38566adad57e3870f4c8489c6804280eb564bfac5c1bd
379c97a782296c946ca00cf7865d8df71cb7d19c77a7dedfb274ec96a5a92380
400cf3fd3797a4712aca5551f3449d1a65948b38e845d6f92f4de17635c4241b
44f752b0bd2e48052d538bc6aca5379f3630ca64da945f794690ddf47e8eaef7
4b436b0b6a47db85c88f83dc3fe3fd9a96c0a4018b28832165df929dffe0bc86
4c1606563842cce5f1788329d4417ae3618b33c6365c56a7122439b6ab45c977
4e1c30469b24a3e29ff7ee42e124056a91e2d5c892d1693d3ac51f456d1e1df4
517364f2d45162fb5037437b5b6cb953d00d9b2b3b79ba87d9fe57ea6ee6070c
5ac1c562745247323b1bfdb7a14e901755592aa99bbe2a8d585247c52b6ba435
628b3728a18ae3bd7813c844dfd902f74a581371230e04677a38fc07271a5951
7df9f467d23ee1887edb2123cca10a1a9c4624cdcf7199c64e78a8430031f9f5
8802cb8dbfeacb9b6d420ccc719667263de50cad229d03b71f194302b01fa93c
8f6cc14698864746b3bc0c6537501405f415048d28b6e9592fa91ccd3620e619
93ab9ddc223156f5f4ba7ff8fc14a885e9b5946fc10917571022d7c2d9a08886
a38ce8950f9fd31142fa9f3f673db29058f43989dd4415118bc8d223d0302f77
afe332157f4efe355f3181284e99f4331c4d19703ed1678b5316d2933f95e98e
b13a03e0db893734298cbe203bf264407636ffe5dab0a141f83c492d0034dd6a
b67a7c07a045d7cb0f2e216a557aec0d99405e17c36d1a6b1ff3e2733aa35348
c3ad6aa1c03fd108854f008cfec2753ba623e1470a4d61798b5d8c050e474868
c5a324f181af16879b6c4c52b731b23392f2816def159b157c4de620cff1cd41
d7b2b2a6bc6f14410996f428d470e77c5d72dc469cd261717b0fdd6f6b31d3f0