Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
be0178a9305c28753b9262a98a9f639f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be0178a9305c28753b9262a98a9f639f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be0178a9305c28753b9262a98a9f639f_JaffaCakes118.html
-
Size
4KB
-
MD5
be0178a9305c28753b9262a98a9f639f
-
SHA1
aa9de3f41e66aea38e9756c84791720e3a41ae91
-
SHA256
1b669f9002d9553dd45a403f7ea143e9e52381fcd0a90a5f0a8224ee4060b381
-
SHA512
4b2e94674cee476837914785b8bd19b4999e78b1cb2c26b500b8dfb63131a8d71f1f5bab18425cc24a02f8d6b2d1cda3a078b65720c2df9a3f32479b5d9f3394
-
SSDEEP
96:1j9jwIjYjy2K/DZD8jEKVk10BvJADh/pR8EbGD:1j9jhjYjHK/lyEKVkcRADh/pbGD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8051b55de9f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000070e5455656eeb64e770d26883d605aecda865463c205345e0031610637b4db67000000000e8000000002000020000000db24f0fad57facf32d6d88caa4359f312f0ad447f10dfe6c3fc1698cd4d5a63020000000d016ad64a1b8e2dfab78445995ed7de7c177f0385844037ad193cd39e1894b71400000009ef8c519886f82612522f6ed382f1165b75ba39f2794957a9e0f9e654c234a444ab8568c3257b5ad837a31ad97826797662ffaefe8eb422bc31147908414002c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8925B581-61DC-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430640397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3060 1984 iexplore.exe 31 PID 1984 wrote to memory of 3060 1984 iexplore.exe 31 PID 1984 wrote to memory of 3060 1984 iexplore.exe 31 PID 1984 wrote to memory of 3060 1984 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be0178a9305c28753b9262a98a9f639f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836a7e2bf704aea86e95d782a3cd6d2f
SHA1cc6d9a563db5da7f6caf1bb6cd0e77c522afd9a1
SHA256c0a7abe26147ec1f01b12b20ce6eace8bbe2565f2f378f55e818915967ab873c
SHA512df8192dfe8a6d82cb1253c7e04fd73e044e4d3b1cbb53c8ecf5b8a217259478894722ed9e30eb780e8135989d37c60d8be9aeb2cadb44fe304969637be399b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cbff484991cfddcdb18d64019869811
SHA1ad138e2644d40173f61573ba71b1e8f4063fe613
SHA2561cba2dfd0dd5ba03e70d5f48a02075efb371fba44552f73d9d94d854d36be20d
SHA5122151785541160527e3e273bb5219b2cbd18c931cacb10200a3bf3e158b2309367413d17bac586c56108610f34c5041b38c23b07f7168e2034a73020404f25f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58faf9bc166a0062b5f4ff1c07d3852a6
SHA19efee9e434142d855f4a17b5edad595dfe34d274
SHA25678fc2313e00732c50492b369f3de0953e53de13eaf330d2cfbf3fcc663be7264
SHA512493b82a3be1198adc1a5da34392e82cd4b73d1f307390e4cddacab37c92bce0920f59abcbf2d390e0a47e98c016f440dd4174b11963ab4e17dd01b9c50c2c888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2eefd924f47b64101750e6a9649a366
SHA19ddf8c1e4773d89964d41e8b02eee1c0ca265b7d
SHA25677e6e0eaa2a9b78cc33af34b29a5122c8f58df47af96ef57dfb7c667002ff1fa
SHA51207b29771a5485b1b543c93b6d0726e56bad8284d86c84859ef293f61fef76379e00bdc8c8c920c800e391374f29e8efe89d97ada09cd959c2bb8af078231bb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ec565100d557827de2e5a44b050a9e
SHA13fc53bdddda5fb78bc06f8373286aca665bf7c8f
SHA2566eb01c5d50731f1832985a7700873adbd078c784ee08ff7b64253adf15d46f88
SHA512bf705fe7bed472c17c8e4a7e09963f9036aa592d61ec04ce441360a3f59901b186be6df2f7b0f99c51af72cc0bc3f4aafcdc4ab2849be5c053e8ad0dc71de52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57979fe2381274db78fe1b9698bb4f5da
SHA124a6c311a80ae4c83095d20a952186c41f2f0c53
SHA2567efee6afa74bbc14c6cc430c8782eba48db67807c74da3b21f31ccd40d797c79
SHA512ddb433e9421670ae38e71fb4b4c1d1c3296f025072712a74dfa8a872f0e6467833f6199a78a0aed56a4366c6e2edf10b1de97b6272f3a8d75b43b00d6762679e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ff4ea7212c0ab389571debc9708be0
SHA1d21ffc4e730c3b8456986f587a37979091c2ace0
SHA2568aa88fcaa7fbf1d0c7c937bc7b0d6ac8dc87cde72b4de81e084dc1c2b4c247b4
SHA51210668a4e482057bafaa4734cd7b55ab1ca43b55f8847e15c7a5cdee5e9eac23c5bbdbd0143cffdd968d139ae5a795f5792230acb29c2292a0961e52bd696fb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbda061c3961dea9f0d69ad8b0f267b
SHA1f4e37502abcd787158122e3a4ddfadc1ccb7b548
SHA256da49f277f5ce26e770365d833097fa8a6541b47b78efc00cd198018cf86ebe65
SHA5127ad207fb32db25995299af6e23bda709f73df10f91a31b8c02b845e8f0b07252e90c11901d319813ec1be596e77c44eaa1dfe0bc4a608559f92e2c9e3e97e563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e95f0df7e24698cde489c79bd6a188
SHA1533c120ea795a5ee85ea36a7e35fb79434749f9a
SHA256ced68fbb040cd7b8090958ff082af50a3d152124fa4e605c85fd31b7c1cc348f
SHA51258ad87e42b95456d74c8d75c64d816e8062f4bdd5cf45c641eda5f076ea846a3790e70ab50d9d3e7ae13b5c4717970c4ac4f67140e42d64d18ec45a6ff489f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8aa58d7977954113c7ee057a0906e6
SHA1a199d47e6cb7b205c2f9fc95d8ed78ea18a4d078
SHA2564cd6b08c6565b88cb4cb8faeff85841c52413c09489ae16eb725ca61f68883ba
SHA51280f06b301d630272157f70cbaa7d1af1f2617d5e9bed3682f696dee7a1d66885ed7dfc7038cf977100d30886117e66fe13b5ce19913ac6c6be7db3f8e9ee01af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0e46d5fa3dfe3feb4a6700580dee11
SHA1d4309ff7edd5b664a9dd27049b7391a03a7f5bdf
SHA2569366ca4b4f3989a40291427b7059c85d4b41713237845b2da41ded8836f8f6b9
SHA512e926f2794bb019032d4ea3d306db65a65d5e4ddc4a7da3b51bde8b4b18e83a542c7bfaa56b0b01903d201aee0434491e04b23e0878605c6b2295c852da013eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bfcb0b9118ebb247efc7b0f9179bc6
SHA1c5f1e84e4e7ce9a6120ec60ce860ec50c2fe65ee
SHA256f8bdcad6fca4677af7d2cf956bd3be33b622617ece495952e607ba9bd9f74338
SHA51224b8c96946ef2b0071a4c5c43ad3e854381d7a90df9f4713476e355eac2f83b2ad09b4343878544d93031a586963a47acd34a89b5d9be70b7bdfa6df6958f084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf9d7bbb4ba21f1fcba04fa74793cb6
SHA1410833e00fab37753df656d2d9ee52f95636a3eb
SHA25657b7422f52ee721ae87c99a26246f5de23b114c78016854948a30aac4818459c
SHA51237f94ee39f2fff2018b1a09c510374c2e99f1480ef8546d0c8492b4b5fe6a93c563eff4a476590f0f161818b9f3623bafa0bdd2797f897ca84c12a80a951d746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9260b71e0e11b929f501a3ce00babb6
SHA17ae090fb77c786be8dbbcde0bfc34582876b019b
SHA25623d14cfdb9d7c56f2e2214c47c3fec333ef39730da66302dd04dbdaf86dcd85d
SHA5127a733cdcdd8022b37eaef4f97354ee264724d5039b8f1e4fb869058ab541980a5a7b9714db610f496f583e5aba8117b1e9441b2937c8e6a074bd0eb897afd2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559eb8f79714d02d031c73ce8eb3748de
SHA10407dc2c0f4274ad22e67d6ad2544914b09c66d3
SHA256c1efd70fc43050aa67c425d2ab91c31030f4dbf22df8dc0c999bf467827ec2f4
SHA512e345ee53b2815e41b3a81392ab9474309a926d0251b17bce3aa30256191b851cb9f91aa02c8b90c3f2e2a38847c94d692caa7efb4aed92a72315595ecf73fe73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51efe87c1d486456eeeacb161c4717c9b
SHA104d3de68c7c7811580fa39cbec131b8ad4c83015
SHA256de4ab88577c6ec8d27843c1eccbecce3d84f8288d45b705c3ad139b86b749e47
SHA512b3f6a161424d9ea592cb1ce58bb89169ddd565e1d2fa612e4940629a1a201b5ab24e776662d29ffa353c64e704896787519768654274772ada74c966839a2b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb24cd14d5563c8c401be5976322dd1
SHA1469ece206de7d9813505299c15e407e58f17346a
SHA256bdedc5aa463e3c024de319cc6fd5294c6dfc72a76b4662abf8b80fdf7f79579b
SHA5129e5085d6bdd0ba68a5708c6292f0fd360272f05ed21e5bd883476ea11aebd5a07032733cabd73e0da88d552c5b51d4fae144435c1660445ff7ff304fbd91bf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564235dbbbe8509266c7bd9c03db61299
SHA188046aebf78f74846e6cab4b4185e5d9d45eb828
SHA256b324740816b29e4beccd140bb9ef1903a05dca61dc986f0704c76876879b6c02
SHA512390393683b510b1876679133be2aad70d0f0b291f14b4fa69d415432c1968348bfbe02cce605f8bc4bb160bfbcf1027236bd680b7f20fd69f5bbf95a5d12b98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6dcda8340cdee748676cd5ce4427d0
SHA1a691d8d583ba5b8335b3ba48d5a4e9329e92fdb4
SHA25657101b38b5bfd7efd4b15987281d44d80551c9f04e7e4e1a914b0d6639af1301
SHA512acbc970787a245fe5063929e06eb01829476609ceb6636da8c157d3775fee8ed59620fa4f9a6e43ef3e6f807d06ce708ec497775d6d4c477cb331dc0214ab195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b1d920988f57c34d061cc89db02acf
SHA1701cb183e65e974f285de6e9f6988543d9efa35c
SHA2560c0690043cf734cf5b241f513fce40e8ab5c02dcbaee71be79d4c955fe25c3f1
SHA5125245128513caa8f1aff164e850b83215cdb5e8518c01bf6c9e4b8ebfbf7585ad9e56dcd041ced27de8cfe10a093e2d6733ae0efd79f30038a0e4c1b82f66c334
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b