Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
659e653780d037701ea276d1e9da6e44_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
659e653780d037701ea276d1e9da6e44_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
659e653780d037701ea276d1e9da6e44_JaffaCakes118.html
-
Size
70KB
-
MD5
659e653780d037701ea276d1e9da6e44
-
SHA1
32e28f583f077e8858e113c7bd428c4cd49812ec
-
SHA256
f9e5041d072af3d142ece0791fa9a1aaa8ae752708a4602037262dfe810bc8a1
-
SHA512
fd8a8da925618928f7554dd4f036cce53c7f63adba79ee5360e2c3f148be84d891fc9082315f985067f54364661f8ad49697d75b8a4bfb0eab1d30fe8d88c25f
-
SSDEEP
768:Ji2gcMWR3sI2PDDnd0g633khbwdoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVz:JsH/TTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c9346a0216d3820e55b6cc5f9858522cc15fa780c56bf9523a1273fa99765639000000000e8000000002000020000000be51c1fb15f6a36a8a508a0cbfc3d8cd1f1e78ee162bfbd0041e0f1997fb413e2000000042be6d24fbc3420822ff5fd0b4637c103a41778f697d25511c18f49321a4027140000000c545f11d35fd6caaf8696613bb4a4b600279ecc63dfa739c82b5d1a7b17dad8faa24dcf76dc2f92e2d08c161a9a694369904e8b07b1d2a7fb379129ec0535be2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D9088A1-17DF-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505119" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a627f2ebabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 884 iexplore.exe 884 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 884 wrote to memory of 2208 884 iexplore.exe IEXPLORE.EXE PID 884 wrote to memory of 2208 884 iexplore.exe IEXPLORE.EXE PID 884 wrote to memory of 2208 884 iexplore.exe IEXPLORE.EXE PID 884 wrote to memory of 2208 884 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\659e653780d037701ea276d1e9da6e44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d889142f756390bb05bdb322862a5128
SHA103de39ac91eb578557cb4dc82214a7cf83f5c1dd
SHA25629c97a7795d23998333970baeeb0847fda57b6f14130bc4aa2d56083e56bba2b
SHA512f85c5263526f5efc9269ffea8f8aecb5ad0588c4c21bb88826546893dc74bcd2594f72c52a27e902a5f1e125db2c748cd6f9a96dc4f53bcd50a815f336643da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b341d2ffbc8964f58cedd5f79dddbbba
SHA1cb1a50af0b6197cb01a37b39ddba27c342fb6345
SHA256507f8370dccee7570a809fe42f0a61307621a08ccae7e15ff98f54a14ce3d347
SHA512ddf902464130312a153c610f1db07f1e4e0ef10224ac9598f4d14097447a748ed21878973edb31909c2e7dbe5994f5533e9350e0c02ab397b8b59847da2e62d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b4097ed2166be01b50a4cc5d9cb974
SHA11dbf47c39c4cec3efeb1a27d724bf53c8cc4a0a3
SHA25627cec35f28720c4d6319c13d56865a0032ddc4eef1bf1bc1f27cde77e90589c7
SHA512b344ffb5757e908869eadb602568b6e38d77b76635f300eb4fd2835ca077f42db39d8cf62b447962dccce017e32fcefedc38fcbfb361137b714e0e5a693ceddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d69ca1791644696ddc7fb9e2772d5f
SHA197d4a18c75c902a8e133eca2ddf85dc47ef2890e
SHA2561222c8ba94e40a78c35a67f924f02d95428833b51f3138bdf1c5edce8bbe0ba4
SHA51206992e456ab5489ed4909da70c870a373f396c7ee96e43c01201f4edd99b521358cd05679d3c0863bf6c9cc7c1ba107e036d407cee4a5fcce080b5ba7f822975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51392045338daf41eac04c805e188957b
SHA145c9823dbf171ea90e0a532e292d82ab115f2ab1
SHA256d9e275fabc72a6a05d1952fa2846e9ae018a020dfbec490b286885b2c8e55b17
SHA512515d192a98abf7ced3548df0a96c08a0aa66eaa825c3dd2fd0f04f248b1dbe63f2274db75694a29e1acf5ced692dde82ef809cbf0e468e54d940021e7aecf915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f1ed92efdc63729599106a31957ec1c
SHA15937f8cae43844d23f771298dbf2d46c4abfad03
SHA2567c8ae6b043880e68999378674a9d0e547ce9807da98c9db2d7d5a83ff179f58a
SHA5125e4aff6fe9b1fd82871465bd662c7539f12d354c16dcc63fe057d97fae4baeebae2e10c06320e2f0b97a27b16890c641aab91bbc91bd09ebb584ccc7b98b4b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576acb65315aa54e8c2e0435a2d10e0f1
SHA1205d437a76fbd183849ed3467b2d265724f94bf1
SHA256f0888919dd8dcf2e7ded171a4139e67f9039df2f9fd1a06d71e38df482b0d0cc
SHA512307934ea9ea244b32c68b7f7c263ce4b880ec24edb5b8839e56c8af5afb847ddd7bd5b4d10089e447b60b49dac168ea4ea3f146e527af3755f0bc2dcfcfcf0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58081211b312aeeea393a5f149d7a0e1d
SHA19ee14a0efe11330262ed8f8fe1e1043ce015a84e
SHA2560e0023c77f5351147c8932b4468cbbe70dde9733d69ca58e86b912a4ea157f61
SHA512e390f38525a071fe1839d241483a2356dd05bee41417148dffd166986473d6f1c35757d8f01eedefc168f584f678d6229f3fd28ca761aabdcfdb9395129df5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50436b7c4bf99a085a95f2e79f72d1e41
SHA1c00ee211cf1f5f7f3a1aa2751b8377f72ec31c98
SHA256f985d3db129a72359eae1f2adaeed111514e1c347b8f2d63fac8688d7cf642cf
SHA512e2251f7fcef9c6381bbc9e70960ab077de9d206f49ae0b899b5f9833be156e03e4c3cabf75159d75f054a71f649c05d501e09a3bf3c14a49b62746292580f89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5791cadea1d371ad5e1d9f8355e7ab624
SHA1d5ac56990fa9abab3b4270d7bb355da5cdf03049
SHA256c6350e27fd4d0d654d47f1ad04266c5d5b31cbeb2fbd8f7f8e5806f0e72bfc2a
SHA51256da4bf1a97771d002cd8d8c83ee8f7bbc8f1fdcf4bad89592a4d86d78f3917cbabb01692e67e0a02831385c05ed7b60c829e39af5475377cfb28e9e97dea665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cdedea7bb560dc30efd2314b1287b5e
SHA1d242525cce94f4e301f54a1376b549ddd0cc529a
SHA256e02af442ff0cb8d214ac81df3aa15f98bfeeb1af64a0629e8e354d943e46940c
SHA51232054ae23affc9d0baadacfa791b22f3e6fe0ed296594e6e728dc3fb636153c192cdae938e8713f7b87558c356a00e9ff555c672b496d1ff66a2b8f623e3dc2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51847dff7baaa86bfc97336637572df5f
SHA1c69358cfbaf496b6566a492c305d4702e35f38b7
SHA256007104ce9379c45a0fdeecca125e116c8815bc2fb961b7ce0083de5307980101
SHA512fcdedf227bf6b5b42054d9b1aed3599aeed36338f6fac8d11b2ec28ba0cdee1f7305138a4f5366e3f71048f262501b7b169e2a1b73f74152785be8625c17ecc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe488f19a752531be79f7f0e987264c
SHA172066b8593aeeb57ac88658e535da3cb2debc537
SHA2562c5ace172cd9ffc523c8e05a0c66327f29cb859cd520ea183a8f3a62b5294c05
SHA512ede58a6a560f89f508d7557ad5e7faa642941ffed1b87f9d533312f9d66d086aa7e57cfcac61cb619561740deaf5ffa845a9cf42cef707667e5728f551b19b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57915cb8bdcdb2e6df4da6c70133633b8
SHA11d39c6dbd4a9cf397790dc002498eb15f0e6ee4b
SHA25690eb697ec2abeaa1d5779ecd326741e77f355098ad524a400d5255814a25ae23
SHA51271ca80baee83e8b380fc2bb2224e0d64bd639eea3e9502993d6217fea8f0f5d58d4005a4e9f48db2be17457320e2d776d7d0f4183e8117131593b54e30a2fd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce5df79a52db3977be410f2d4a31e14f
SHA1628e1ffa3322e4f5b42e3aa5d0304cac05dbd60c
SHA25603c1d13e80999e3efc3ffb8db07ce098854c7373c0e5240b07f8356bb5f3abbc
SHA512b500ac8325b8d130a59a840cc2b9cb709ff97cd0346eeaf2d209c1052a07d0cb4066939ee44424590cf0e286a817f7f02eba574e1097fafda1baa7ef85f8974b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf6c32fe80c33dee138b1a676036d6bb
SHA1bbc2b5abd9db939b63aee4b7ef241abd3831f214
SHA256af32b7e3448931b7cd52a4eb588b9ca0b981f3168a5a489dfdc21981b8734f84
SHA5126dea3b46d92c73e7c7c94485caa91ff3bf90e050904f38c921b10b10564f7ef5639c2b59cab22f145fb613e917819d9eece3c67e0ccc7680df62f6fcf3bc3cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54768b453a07c75a6b3435c3b47914dbf
SHA1e3f4000e9074856f7dd8e0c550ca178cea8f719b
SHA256afdd3fbede7fd6895a78aa0573d7fc0c55f640eea2807a797be1fc35e1592f73
SHA5122f9452eb697ea7c3ee9452d63d36d6da92cbfcdbe3d7b4a096ff364362a72f5207f04712b30c8d3d57adbbf2e42e643ca4621ade767be31bdcd2eb4328d162cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548f24bb3de5cbd78c379b962046a8abb
SHA198ace3b97293882431146d8113bfcfc6856a92b0
SHA2567940e1cdebdb1f148a69a2398c8f5269e24ff1561d5333ec26d2cb3be6191654
SHA512c2a83d62cf3de2459a8881a90dc0e4653cb3faf4051fa335b0f6421ea5c330b8c7381f17197363eca8008ba9d67a629b4d2613329107f2818d68347fc054c877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560132b1f2353c5c7af05cdc60dd022ae
SHA109fddf13d3e62d894bdcc4f216e3c142a8b2afa1
SHA256bd3fd7861059d8c2dba278a5ff91b790a067117529eb83c6b05145eb345e0e69
SHA512c34d572854c6c217a888e5ef01a181f312c46d0b7a1494b13f5831281dd70bcaacc0c26f5d41efe39e9c8e1e75a05a79e6009e8e21b1ec8a1acb46724954d8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564687c276c4d679ed8b314d0a12115bc
SHA192033f1a278291d8881f1c7f290b47a4b38d3983
SHA256831a9966692f83227baecd078d12ab08e0dd65b6b1c2579025898a7987a7b46d
SHA5122ad09f262b96e8b45961c8bbdc3e4d876779573cf7791d9b7317499e323a42ec60eda374106be1274f97f565a3e96fb993ed68aa5e0b5d656f4280b8c3e7ecae
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a