URL: https://microsftteams.com/?em=76b54c77-2d2d-4742-bbf7-d31e97fd3fdc&id=90d9115f-2e43-4bd3-a035-d77bd2d402cf
Submission: On July 08 via automatic, source openphish

Summary

This website contacted 3 IPs in 1 countries across 2 domains to perform 2 HTTP transactions. The main IP is 3.10.195.7, located in London, United Kingdom and belongs to . The main domain is microsftteams.com.
TLS certificate: Issued by Amazon on December 24th 2020. Valid for: a year.
This is the only time microsftteams.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 2 3.10.195.7 ()
2 3 18.169.74.96 ()
2 3
Apex Domain
Subdomains
Transfer
3 sophos.net
securitytraining.sophos.net
690 B
2 microsftteams.com
microsftteams.com
374 KB
2 2
Domain Requested by
3 securitytraining.sophos.net 2 redirects microsftteams.com
2 microsftteams.com 1 redirects
2 2

This site contains no links.

Subject Issuer Validity Valid
microsftteams.com
Amazon
2020-12-24 -
2022-01-22
a year crt.sh
securitytraining.sophos.net
Amazon
2020-10-28 -
2021-11-26
a year crt.sh

This page contains 1 frames:

Primary Page: https://microsftteams.com/?em=76b54c77-2d2d-4742-bbf7-d31e97fd3fdc&id=90d9115f-2e43-4bd3-a035-d77bd2d402cf
Frame ID: 2A9DF4A075C875CD5FAF1AEDCC346A64
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

1
Countries

373 kB
Transfer

860 kB
Size

3
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://microsftteams.com/style.css?id=90d9115f-2e43-4bd3-a035-d77bd2d402cf&em=76b54c77-2d2d-4742-bbf7-d31e97fd3fdc HTTP 302
  • https://securitytraining.sophos.net/login/sso/WW5DNDV0cXhrbnd4WUR3TEt2YUp6UUZLRmtQRHEraGEzOStidjJxSnlqdVQrS0ZSVWF3VkMvczl3VFBNV1NHWEtCTWsyQ2RFYTVmZmpXZytoaDBNMldaR2NSQTdQNU40NWtVR1NHUzkvK3lTNTlUVktraFRBSjFldyt4OTM0ZmZiQ009OjoxODExYTE4ZWFlYmE2ODJjZjRlNGMwZTY1YTVmNzNjYQ==/af8b1e29-d061-4ca0-a591-898a55620f52/24d65bc4-29a4-41e0-b95f-4b57bc7361a5 HTTP 302
  • https://securitytraining.sophos.net/learn/training/af8b1e29-d061-4ca0-a591-898a55620f52 HTTP 302
  • https://securitytraining.sophos.net/login

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
microsftteams.com/
496 KB
373 KB
Document
General
Full URL
https://microsftteams.com/?em=76b54c77-2d2d-4742-bbf7-d31e97fd3fdc&id=90d9115f-2e43-4bd3-a035-d77bd2d402cf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.10.195.7 London, United Kingdom, ASN (),
Reverse DNS
ec2-3-10-195-7.eu-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
8e42ace49448f42e8cbf36f9da1d7f91a643bf4479be595f188456ef339d3105
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
microsftteams.com
:scheme
https
:path
/?em=76b54c77-2d2d-4742-bbf7-d31e97fd3fdc&id=90d9115f-2e43-4bd3-a035-d77bd2d402cf
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 08 Jul 2021 13:11:32 GMT
content-type
text/html; charset=UTF-8
set-cookie
AWSALB=2pBTeIHpydmuk46m8n/ijsR6sKk8tDE1H3ECqI4sv6xE5OfiNTNjUxZMh1CV7x4AgFYxS+SPrx3nVP1EharKSZk4K4qRdyo0kYiSzznpp4dQE5G9K8kr7t3SRpWU; Expires=Thu, 15 Jul 2021 13:11:32 GMT; Path=/ AWSALBCORS=2pBTeIHpydmuk46m8n/ijsR6sKk8tDE1H3ECqI4sv6xE5OfiNTNjUxZMh1CV7x4AgFYxS+SPrx3nVP1EharKSZk4K4qRdyo0kYiSzznpp4dQE5G9K8kr7t3SRpWU; Expires=Thu, 15 Jul 2021 13:11:32 GMT; Path=/; SameSite=None; Secure cai_ext_phishing_session=eyJpdiI6Im9wVndmNmZYNmRwOThkZWUwb011RHc9PSIsInZhbHVlIjoiQ0xPTVwvV2dkenA0bllWVW5sMnBiVjBKeDIzT1dzM0QwUzdSMnZnUnVpOVRwVE5sZTFHZlJ4eldHUEIySUx4VTMiLCJtYWMiOiI2YjgzOGI4NzljZDcxYjdlMmM5YWY3MTdjZjgxNmY2OGI1YzhmMzAyN2NmODY3ZmY2YmExZmRlY2NiYTEzZWMyIn0%3D; expires=Thu, 08-Jul-2021 15:11:32 GMT; Max-Age=7200; path=/; httponly
server
nginx
vary
Accept-Encoding
cache-control
no-cache, private
x-frame-options
SAMEORIGIN
content-encoding
gzip
login
securitytraining.sophos.net/
Redirect Chain
  • https://microsftteams.com/style.css?id=90d9115f-2e43-4bd3-a035-d77bd2d402cf&em=76b54c77-2d2d-4742-bbf7-d31e97fd3fdc
  • https://securitytraining.sophos.net/login/sso/WW5DNDV0cXhrbnd4WUR3TEt2YUp6UUZLRmtQRHEraGEzOStidjJxSnlqdVQrS0ZSVWF3VkMvczl3VFBNV1NHWEtCTWsyQ2RFYTVmZmpXZytoaDBNMldaR2NSQTdQNU40NWtVR1NHUzkvK3lTNTlUVkt...
  • https://securitytraining.sophos.net/learn/training/af8b1e29-d061-4ca0-a591-898a55620f52
  • https://securitytraining.sophos.net/login
0
0
Stylesheet
General
Full URL
https://securitytraining.sophos.net/login
Requested by
Host: microsftteams.com
URL: https://microsftteams.com/?em=76b54c77-2d2d-4742-bbf7-d31e97fd3fdc&id=90d9115f-2e43-4bd3-a035-d77bd2d402cf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.169.74.96 London, United Kingdom, ASN (),
Reverse DNS
ec2-18-169-74-96.eu-west-2.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://microsftteams.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Redirect headers

location
/login
date
Thu, 08 Jul 2021 13:11:33 GMT
server
nginx
strict-transport-security
max-age=31536000; includeSubDomains
x-frame-options
SAMEORIGIN
content-type
text/html; charset=UTF-8
truncated
/
19 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7d9efb8a4223c5a409e3fec8a1e496601acca6ad97af9958904571fc7112c63c

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
778 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7b9549b57de2ab1aafdb799323c9aa144df986d3945afb53628f81e478fcce51

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
344 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a3efa3c84ac6e1ca48798af1a83d6f02078276607f1447d765c3a1da936d9301

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

3 Cookies

Domain/Path Name / Value
microsftteams.com/ Name: cai_ext_phishing_session
Value: eyJpdiI6ImR3XC9UUHh5cXlsRWZBNXJZQm84MzVBPT0iLCJ2YWx1ZSI6IllaUmdTNU5hSjI0elNlVHpvR004UWxiY0M0enZqZ1wveXpSVUZcL3YwdUpCQ3dITVwvVnVWWk43UXZMa1ltZlwvNmtqIiwibWFjIjoiNjY3ZjYwYjYyNGMzNGU4ZmFhMmU4YTE2YjMxZDM2YjQwNmQ2OGM2MGQ4NWUyZDlhZTUzZjhjYzViYTMxYTUzZCJ9
microsftteams.com/ Name: AWSALBCORS
Value: +cWQOUP325N5EmSWf8oTnmTrH2kkozyLYzCw7js6seQMjYIvv/AxF4SXGCoMP6DYj2Va7oLPdnJPD/mwRvXSfNoPsXZt5HowCmkVhWm2ZMBgM+1OIeNAbGdRCZS7
microsftteams.com/ Name: AWSALB
Value: +cWQOUP325N5EmSWf8oTnmTrH2kkozyLYzCw7js6seQMjYIvv/AxF4SXGCoMP6DYj2Va7oLPdnJPD/mwRvXSfNoPsXZt5HowCmkVhWm2ZMBgM+1OIeNAbGdRCZS7

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN