westscapes.mycustomerconnect.com
Open in
urlscan Pro
52.34.207.165
Malicious Activity!
Public Scan
Effective URL: https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=d9b9fa1145b20704db2473...
Submission: On February 19 via manual from FR
Summary
TLS certificate: Issued by Trustwave Organization Validation SHA... on June 25th 2019. Valid for: a year.
This is the only time westscapes.mycustomerconnect.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 202.172.28.118 202.172.28.118 | 37907 (DIGIROCK ...) (DIGIROCK DigiRock) | |
1 1 | 91.222.9.108 91.222.9.108 | 198047 (UKWEB-EQX) (UKWEB-EQX) | |
3 9 | 52.34.207.165 52.34.207.165 | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 1 |
ASN37907 (DIGIROCK DigiRock, Inc., JP)
PTR: s117.coreserver.jp
inaka.awe.jp |
ASN198047 (UKWEB-EQX, GB)
PTR: platodedi.servers.eqx.misp.co.uk
www.mcgirrengineering.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-34-207-165.us-west-2.compute.amazonaws.com
westscapes.mycustomerconnect.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
mycustomerconnect.com
3 redirects
westscapes.mycustomerconnect.com |
388 KB |
1 |
mcgirrengineering.com
1 redirects
www.mcgirrengineering.com |
667 B |
1 |
awe.jp
1 redirects
inaka.awe.jp |
405 B |
6 | 3 |
Domain | Requested by | |
---|---|---|
9 | westscapes.mycustomerconnect.com |
3 redirects
westscapes.mycustomerconnect.com
|
1 | www.mcgirrengineering.com | 1 redirects |
1 | inaka.awe.jp | 1 redirects |
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.mycustomerconnect.com Trustwave Organization Validation SHA256 CA, Level 1 |
2019-06-25 - 2020-07-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=d9b9fa1145b20704db24731da7a1359b&cmd&id=d9b9fa1145b20704db24731da7a1359bd9b9fa1145b20704db24731da7a1359b&session=d9b9fa1145b20704db24731da7a1359bd9b9fa1145b20704db24731da7a1359b&auThz_=mfrick@scor.com&idd=d9b9fa1145b20704db24731da7a1359b
Frame ID: 003D190F7FDFCDF58121EA32618EDC53
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://inaka.awe.jp/ps_search.cgi?act=jump&access=1&url=http:%2F%2Fwww.mcgirrengineering.com%2F0...
HTTP 302
http://www.mcgirrengineering.com/0ff1ce/?contact&us=mfrick@scor.com HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/?cgi-portal=722907830a555163518f78b... HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/?csrftoken=submit_authenticati... HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate?csrftoken=d9b... HTTP 301
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=d9... Page URL
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://inaka.awe.jp/ps_search.cgi?act=jump&access=1&url=http:%2F%2Fwww.mcgirrengineering.com%2F0ff1ce%2F%3Fcontact%26us%3Dmfrick@scor.com&/login.jsp?redirec
HTTP 302
http://www.mcgirrengineering.com/0ff1ce/?contact&us=mfrick@scor.com HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/?cgi-portal=722907830a555163518f78bfc09b1d5c|722907830a555163518f78bfc09b1d5c&auThz_=mfrick@scor.com&722907830a555163518f78bfc09b1d5c=722907830a555163518f78bfc09b1d5c HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/?csrftoken=submit_authentication&id=49cd999ff67be0d2df12dd821beb3f0e49cd999ff67be0d2df12dd821beb3f0e&session=49cd999ff67be0d2df12dd821beb3f0e49cd999ff67be0d2df12dd821beb3f0e&auThz_=mfrick@scor.com&idd=49cd999ff67be0d2df12dd821beb3f0e HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate?csrftoken=d9b9fa1145b20704db24731da7a1359b&cmd&id=d9b9fa1145b20704db24731da7a1359bd9b9fa1145b20704db24731da7a1359b&session=d9b9fa1145b20704db24731da7a1359bd9b9fa1145b20704db24731da7a1359b&auThz_=mfrick@scor.com&idd=d9b9fa1145b20704db24731da7a1359b HTTP 301
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=d9b9fa1145b20704db24731da7a1359b&cmd&id=d9b9fa1145b20704db24731da7a1359bd9b9fa1145b20704db24731da7a1359b&session=d9b9fa1145b20704db24731da7a1359bd9b9fa1145b20704db24731da7a1359b&auThz_=mfrick@scor.com&idd=d9b9fa1145b20704db24731da7a1359b Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/ Redirect Chain
|
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/css/ |
99 KB 100 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.svg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
513 B 809 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white_ellipsis.svg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online) Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
inaka.awe.jp
westscapes.mycustomerconnect.com
www.mcgirrengineering.com
202.172.28.118
52.34.207.165
91.222.9.108
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
10c50b88ebf99fdf813a4cce86ba218a6e2ea3d266146520529f1e1bddc5ebd3
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
72a20739346593ac3daac784c9d3a571714695693a47efe649c569e455ff5ef4