westscapes.mycustomerconnect.com
Open in
urlscan Pro
52.34.207.165
Malicious Activity!
Public Scan
Effective URL: https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=48894734958bf7ae7e3e37...
Submission: On February 18 via api from US
Summary
TLS certificate: Issued by Trustwave Organization Validation SHA... on June 25th 2019. Valid for: a year.
This is the only time westscapes.mycustomerconnect.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 62.90.225.13 62.90.225.13 | 1680 (NV-ASN CE...) (NV-ASN CELLCOM ltd.) | |
1 1 | 91.222.9.108 91.222.9.108 | 198047 (UKWEB-EQX) (UKWEB-EQX) | |
3 7 | 52.34.207.165 52.34.207.165 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 152.199.23.72 152.199.23.72 | 15133 (EDGECAST) (EDGECAST) | |
6 | 2 |
ASN198047 (UKWEB-EQX, GB)
PTR: platodedi.servers.eqx.misp.co.uk
www.mcgirrengineering.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-34-207-165.us-west-2.compute.amazonaws.com
westscapes.mycustomerconnect.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
mycustomerconnect.com
3 redirects
westscapes.mycustomerconnect.com |
107 KB |
2 |
msauthimages.net
aadcdn.msauthimages.net |
226 KB |
1 |
mcgirrengineering.com
1 redirects
www.mcgirrengineering.com |
670 B |
1 |
emekyizrael.org.il
1 redirects
www.emekyizrael.org.il |
360 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
7 | westscapes.mycustomerconnect.com |
3 redirects
westscapes.mycustomerconnect.com
|
2 | aadcdn.msauthimages.net |
westscapes.mycustomerconnect.com
|
1 | www.mcgirrengineering.com | 1 redirects |
1 | www.emekyizrael.org.il | 1 redirects |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.mycustomerconnect.com Trustwave Organization Validation SHA256 CA, Level 1 |
2019-06-25 - 2020-07-02 |
a year | crt.sh |
aadcdn.msauthimages.net Microsoft IT TLS CA 1 |
2018-12-07 - 2020-12-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=48894734958bf7ae7e3e37d311736375&cmd&id=48894734958bf7ae7e3e37d31173637548894734958bf7ae7e3e37d311736375&session=48894734958bf7ae7e3e37d31173637548894734958bf7ae7e3e37d311736375&auThz_=eric.bujold@bnc.ca&idd=48894734958bf7ae7e3e37d311736375
Frame ID: 4816069F85C4FCDE64F0727F33C9D247
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.emekyizrael.org.il/redir.asp?url=http%3A%2F%2Fwww.mcgirrengineering.com%2F0ff1ce%2F%3Fcontact%2...
HTTP 302
http://www.mcgirrengineering.com/0ff1ce/?contact&us=eric.bujold@bnc.ca HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/?cgi-portal=fdefafbbe3ac66570f3e857... HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/?csrftoken=submit_authenticati... HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate?csrftoken=488... HTTP 301
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=48... Page URL
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
Windows Server (Operating Systems) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.emekyizrael.org.il/redir.asp?url=http%3A%2F%2Fwww.mcgirrengineering.com%2F0ff1ce%2F%3Fcontact%26us%3Deric.bujold%40bnc.ca
HTTP 302
http://www.mcgirrengineering.com/0ff1ce/?contact&us=eric.bujold@bnc.ca HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/?cgi-portal=fdefafbbe3ac66570f3e8574589fd4e3|fdefafbbe3ac66570f3e8574589fd4e3&auThz_=eric.bujold@bnc.ca&fdefafbbe3ac66570f3e8574589fd4e3=fdefafbbe3ac66570f3e8574589fd4e3 HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/?csrftoken=submit_authentication&id=fc0887e86bcf58cb930d094d6e720aeafc0887e86bcf58cb930d094d6e720aea&session=fc0887e86bcf58cb930d094d6e720aeafc0887e86bcf58cb930d094d6e720aea&auThz_=eric.bujold@bnc.ca&idd=fc0887e86bcf58cb930d094d6e720aea HTTP 302
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate?csrftoken=48894734958bf7ae7e3e37d311736375&cmd&id=48894734958bf7ae7e3e37d31173637548894734958bf7ae7e3e37d311736375&session=48894734958bf7ae7e3e37d31173637548894734958bf7ae7e3e37d311736375&auThz_=eric.bujold@bnc.ca&idd=48894734958bf7ae7e3e37d311736375 HTTP 301
https://westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/?csrftoken=48894734958bf7ae7e3e37d311736375&cmd&id=48894734958bf7ae7e3e37d31173637548894734958bf7ae7e3e37d311736375&session=48894734958bf7ae7e3e37d31173637548894734958bf7ae7e3e37d311736375&auThz_=eric.bujold@bnc.ca&idd=48894734958bf7ae7e3e37d311736375 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/nextAuthenticate/ Redirect Chain
|
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/css/ |
99 KB 100 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bannerlogo
aadcdn.msauthimages.net/dbd5a2dd-hlfzfud9-cmuyo-lf7obaiyoixg4nfkodnd-hrliyjm/logintenantbranding/0/ |
8 KB 9 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
513 B 809 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white_ellipsis.svg
westscapes.mycustomerconnect.com/web/editor/css/authentication.office.com/info/lib/img/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
illustration
aadcdn.msauthimages.net/dbd5a2dd-hlfzfud9-cmuyo-lf7obaiyoixg4nfkodnd-hrliyjm/logintenantbranding/0/ |
217 KB 218 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online) Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauthimages.net
westscapes.mycustomerconnect.com
www.emekyizrael.org.il
www.mcgirrengineering.com
152.199.23.72
52.34.207.165
62.90.225.13
91.222.9.108
10c50b88ebf99fdf813a4cce86ba218a6e2ea3d266146520529f1e1bddc5ebd3
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
3c53f9102a200f9a25f2bbca393de98997bef42e53c1bc0c7453bad5775623a6
4cc41e72d0d1d18669322f19ba26c10203475d9db52a20bb930ef04c94be50f0
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
fc4a11d5fc1e6ed7b61c89e53927b89ac63fb3f1573ce3de4f82f4bb723fc188