Analysis
-
max time kernel
241s -
max time network
245s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 00:20
Static task
static1
Behavioral task
behavioral1
Sample
link.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
link.html
Resource
win10v2004-20240709-en
General
-
Target
link.html
-
Size
106B
-
MD5
db300d204c6340ffc43ce116ecdee199
-
SHA1
7670d5617c0763163473a1085920f75ee3f66f8e
-
SHA256
9e424274113218701f3bd4f28351cefcd8981005d44d533c69188158c625553a
-
SHA512
416afdc9bf5705e5a489f6684b3c12eaeffb0d6a88b7a9346527676f83b59e7598caa70b7103bf961798a93171c658d948158ebbd87e8184e3a274a20e1ba886
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009064947ac7c052da7d0ed49e3fb6b2f30f04ebb4653fa273b4de8acf69be06ea000000000e8000000002000020000000fc3f5b942ceb013da1d8727117f3fdcad0443c753274fdbd7be88775d3b17fff20000000a9c04e97041e788914b298e5396f00c2b379591658fe15b701c676c6bdc7548d40000000933555b26004bff2dc2d8ec9168664149e41bb8009300ad992bfe80bb8043715ef15260ca62d85aa7077cf2f3e022a20be17f836ff2a419548d5f23ec5215274 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108501ef03dbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{196F6D31-46F7-11EF-B137-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000087d3c9cd531099117bc05a5d85349abeb4930e156225a9b2463a6150ab1ec26c000000000e80000000020000200000001d519066d2420d0c54d2cd9b9cffe334d3c0808e92be48ec718b7ed20162eb2c900000003746a831e5043d18c8b11593db9421a5cb6a7ce7dece2cbc3a38adc72ecc4b1a10299d99a8a5c82275c8b8c497e7b597373a3d695bcb648818f06bf6cf8452e124e05a2076dc3f01d872a7b76c003fcb574fc29fb759d25ae0f0799247b39f8a087b8851a09c25fdb2210f7ffab3663ac8e14edb4d6115fd878b5fc0b51dff5bce33ab75865f607981fa53092275bec1400000000626c66078a55b43ff3b647e7028f1663f80e7c3017f94b7f34ec14e6e56660120b73be349b7c9a111ec19f26d18fdeb2ddb26f031542813c83e4259cbc76b9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427683126" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2284 2472 iexplore.exe 28 PID 2472 wrote to memory of 2284 2472 iexplore.exe 28 PID 2472 wrote to memory of 2284 2472 iexplore.exe 28 PID 2472 wrote to memory of 2284 2472 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\link.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336c96aa9a398054de0cb96561501d75
SHA18cb3935278d6b58ab83c92aac22af6eff0829722
SHA256eac51a167c52a0db5fc53dbfd5cc118341f73593e7149ddf04ff999d98153fa2
SHA512bfeece0acc9e0b26026c33b9739d2d154fe5319277cfc9e97e7f131e9e407b1edfc8d167498a5787599b50d610abf985c24d0403210ba80d91201348ad3c26a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565627709b61ee6dd24a4735b8c2f537
SHA19882005cbec10123b9f551d8e2ec72cdba49bf13
SHA256adcd5533b79143ab6a7bfa88f296f09f47173c06198b44c9ac087b2d9ef48c40
SHA51232866ae70440158f7a856fdb240efdff72cc4098c89b802ce1911c19c6e686f504dac445726aa5d7942e2f02640916228cf555ffd367685a1ed56970956a5920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240a2e0ce2b9eae0060f6879cdf8dfbe
SHA17a130d74c6ecef6f00af35caeb20b26612907332
SHA256c00a59863ca32025d461c74206158fc1ad74a2207eff69a57d780885f3cd0719
SHA51291fd9d23f024459012a115740bfd476a81e9ab51118282198a7daae42b14afc23e0373405266b1c12dfe2d131d112b0e0925599df8b94629aab151b30572be8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f61467fa19f294e055d9376c4cdf962
SHA10546800d0d6d8a1339e694e1eaa5b2523049850d
SHA2569d8d29226d306c5fa8ced4b86686c01169286951032d9c67c37a99257f559a5b
SHA512e5847cfd9150d089a8d9ecd9c9fe0d278c466195d417ff4ef5b85a9c34ad472065b70744d305128abe0e8cd07a8f3282661242daca08e4d9a381a4645e462af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3c88f5c2127aeb8846caf1bc710c36
SHA1066a2a0d097c982d170f031b245abd5b5be49021
SHA2568c709a0969aa04a6144db703ce8e87876793888e0eca71b4cde44697ad080cdc
SHA51262fab50f106e360ecf24a9a31765fc2af5b720507ab461236cb2b7fbda1bb6188cd546451e46356fd2285f101e055aed0e15a77def15b714fc7b57015ffc59bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b044ede1839e210cafc46e78b7ea6f
SHA1583320ed4c8430787e458675b9f3f844470806eb
SHA2567e61312ff693db20d2b405b21145e7b30ac5a40b31e3954c644fbacbb41ec1c7
SHA512de6d13eb6f63ca7bb0ebf7d8798b4490b825223c0ae7faa1746d02d3fabb5b96110d2bf465d7cb4bf9fadb74a72ffdd312cc0ff57eb04beedcaaa97db74b76c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da908e37823e3c902c20fba18e24b3c2
SHA1bc7daaaf7e7e113cc6861e0cf30b8dbf580b49f4
SHA2568ce3e79579be94e012e36245e76d117ec181d64e243d9b295d41bf4e08d9e0b7
SHA512c2e8b7bf18929666b2f1e0e0da90c1d0803fe28220fc03645090f375aea2874e59b772caeb8be136ea719d7c500dccf409cdf17523823af839486965f409bf6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5a170cf4cafc1f25aa927ffaf1443f
SHA1df52eceaf4a8ccd104c5ba8f4d721f9aca7e22e8
SHA256b73b641ebfd8a0ce14a996af261f06200400fab11155fc38329667a2e36cbd57
SHA512761166c333f5b953d9e40d926322dc3ce00ba339a5e00d30556dcd21878c42afcf0ad840e484f02eb9e8333e757b1f2ef69c0d8790367c0ec35dc1c6779486bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548fab18803e42ae7fb6f033b7fef970e
SHA171c13486b31247177cbac4019d2a7ffd5856e815
SHA25617f7b0c841b2bd9aa3a22412b6cb9cb25970f92a81403d9a01d3ba8139066595
SHA512e0e46b810c47963b245aeac830aa28924f3436171ebcb12313c1b46d5c5f5cc23ceb39fe24c1a8afd53c8670f7d5e94cc19c742f8003a21cad083103ad9ce3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f9f004b8d298dedda7929be18f05d2
SHA1873e28c340924659b9455ccbf6585533f583f7aa
SHA256996fdac9ea0358deb75d541515e140cb4a8a18304c1854d8ebc21394da176e68
SHA5124f921558ce7112aeb575bafd3cffe830d352eb62635c9d37c9b43750789546a25242dfdc5cb40dd9eaa106346257c7b590fb5a0c1a1ec3ce1785bbf2e8db337c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5988968e8f992ecf281ab347c507ebe1e
SHA1fdf9b7e29d532ea08bbb6eebc28d3014cef57001
SHA256e9f6e34af0559ca03fddd96a0dffa22db651ffec9ace09ea78ca7c7ac9a23224
SHA512f0acbf26393865fd383faad56bcd5efb0790fe01b71c599efb6f1f2641ed103221d7f6d26ccd3a9bdc54311981d946a8c95b51878a2141c9f63f8e385ec1de1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d23f47624185fa6c059976df9a20ac1
SHA1ff7ed525c0ee9ce673d8488303abffdc4111714d
SHA2564478e7e2f8c48dd8f6f11c11622c0798f456f39cfbbc6e8805f0b680105b64ac
SHA5127794bd8d6491546c08608debf39b4b0b04673f9fddb079ec0f7d93dbfda76b4bee847cb928c008426512f952d7224ee1022c0db01551500b4f8252056177e036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc64c1b5c3f5cdb86485c1345f17d05
SHA1d0bac2072d72ee464329bebe2ea2e10625a8e1f1
SHA256ecdf5abd597dc4188d7e17df85db55dfa44c44e414118977124fb82be73eeaf5
SHA5128bf1e627a0fdc6abe47d7188a7267813da1f2e3cc272cf61c767f170d473083b65accd2a94a25526daf5e19dd748fba9ed111af6f439b156a81c77239281150c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffbb0fd2ec72a59d5a77ccbd251220c
SHA10d9582e0c96e40480916ee462355390fd12d051d
SHA256c304def16c86335f9769812020175a2faf2199aed6c99954eff4a497b06e6441
SHA51232438ddc2808c35048ee896df84447a5fc3457ef8d95a940503a37ff30d8c609a4dfea075db103aa26089bc28061d0c0ba00353336e3a19406ba74f6939558bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a35efc9e19d23395fb5266bcf40978e
SHA1900db85b569ce1c0deaaaa2f5514ca32b38b094d
SHA25689ebb0a28110f1ee3cc911bf902e0ed25a630ec8bb0d1abeb7724df6f67cfddf
SHA51213b963f98d7749c87da1c1f94c2c06427b55bc0bae4537ec30ce17647e297ce22aaafa706b5d0e11e6c181a3e7cc87961477731a23e5d971d0943d7b5cc63ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3eafb8249ee97b0ec353168b2b580db
SHA186ecff3b23e8b11422cdd5219912e3be7dc87c6e
SHA25673a5f1ba1ea21fd157eed1210847d81567c74f662429368a50cb166c89e1bda4
SHA512658aac33363cd8c443ea0b948be3013addb60f4de4071f1e476112676c53bd0cf5e6ab05a2f098257a8537834ba91abb1ff3b9567961acde5e6908d49ab93083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c623df4e8b5840c79cdee15df10bd1
SHA1f113f64cc6896bc7a8254a62a49c7a782909daf7
SHA2560b6c3fbcd1af833e5a7268199e75a7944705e59ddebd798cf61433b83a1acbae
SHA5121981c6d4e5381d5275a8aadb575decfd276ca949113b3b0506b00b319ac37f07518655652dc8adc934003c52ebbe37568b88283afe03994d167b86a95b3acb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d44b615e69dc2e710792c198c7a059
SHA1f1b12a4f6ba12f1f5d0e963052c8b01511b64460
SHA2568e458cc8b72a41d77d6f748a2d00a5d4a7c386f2c87ae20799250dcab25776b9
SHA512dbca8ca57ca245ab79e6b161a6596279386748ca1be4514254dc04fc31aaf0be00d072f259f8c20f6449b457d9bff7bc14d5b00301c34bc606ba6f9f81d0b63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f420075e3d941755b2761b9e8565b085
SHA1a7d20c7852f61a5e539f048e6e653507e8176dae
SHA25695f3f9d93c7caf2a6eb298846c26dd8131f7446824c25224854cab5de434cf9a
SHA512d4dd78279948e518731fec85e079048fbf96ece20baee12de74df0bc9a66a62f6e4c9a8824981a2f0832b3b95d04de071cd010d17815801980712c46f53835cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\favicon[1].htm
Filesize988B
MD5431da47a6b8e30bd7d01fd28fae83cbc
SHA1b111ededcf379236bb7e88500e6c3577500cf465
SHA2568fb876fd7e52699fe2c6f1bbc8e70552e06eddd813e9e5ce165fea3d6c354c9f
SHA51219b54aa7ee9943ba2e33b3f275d294d882c76f7e44115e45de7d5d5d860e992e297755512436e9e28ad9be201de5d45f8ae498c675d8f413dc2de21127ec6498
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b