Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
c9205611c2f19e72e2aac1138c888b40_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c9205611c2f19e72e2aac1138c888b40_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9205611c2f19e72e2aac1138c888b40_JaffaCakes118.html
-
Size
904B
-
MD5
c9205611c2f19e72e2aac1138c888b40
-
SHA1
89628e49fd808ed507a7cccb96445ba7047e7736
-
SHA256
75662add220e520d6f4fb205b9b611acbf94ee2ed5ae445f1b9d9b782ec05b3f
-
SHA512
7388c0adc6ea63ac501242ed8420f87654f58c71b972017f034ce3234bc907a6966324568fc25cbef6775687ccd9af066687ab29e1771a8f9b12126871fbb30c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405d28b62afada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431108296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000412f59547fa9ad5c0f515c5d6078af78388e46824d5fe4f63d3e890f5b6acb06000000000e80000000020000200000009367a130d9a8678aedb9b2ba52111ada34278039361ca78272bbb4198c2c576020000000df61b055efc888f37389eca78172e0084739bc25e690add23421b6e597b2cb09400000007003486f2ebbc12a6df59b5d871fef560c40b79e75a9d69d837ba7962d68d447a89472598ab396d5fe693bbf3e414cf51aa1368202c9a355c4dfa09c662808e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2B06D21-661D-11EF-BDB6-FE3EAF6E2A14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000e32d9b5bd0e66b46089b1938c49c4185e02f985972f995cce5024c3e2f138988000000000e80000000020000200000001b1e426507e47962d61671cb5c71c3377e2344b3d9431761e4107556b35f1340900000002dcb62cffa8d65dd6ea4abe4aba4c8091065206869750a0500cf90d3f330e66a1afd4aea406fa99933f90c904c892e791d1478993eb83d126c1d93915d39641cb88640653f04e185f730cb35cdb69fe7190f9b4153883b06e0525359e2700570d86eb5f345bfb4be0a24fe2ecd5cc7c8d4f674bcd564b960c896afa06751970c99cc7c7e2f12bba904c6f15a94f2a078400000000a38fd3ad0e5c7f862f572b72f13ef9afb217680ff174f777dbccb1751b369091bb9f485407f43116c2fa7d34a3b392cd55990e8c7937a9f0f44edb15804947c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2368 3004 iexplore.exe 30 PID 3004 wrote to memory of 2368 3004 iexplore.exe 30 PID 3004 wrote to memory of 2368 3004 iexplore.exe 30 PID 3004 wrote to memory of 2368 3004 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c9205611c2f19e72e2aac1138c888b40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040a5d0610495abc57518621e50164db
SHA1611484986cc3c7c4c627ce41348f543e4d95edf6
SHA2561c31b6effe3b175e352d07394539506417d6a258700cd7be329d3602d6d5bcf5
SHA5127e9fa9b7be2e054321bf99c71c16259c408d7193bf8a617ed1286367bfdf3dfc3ce51e312559595bf12831e345f82d387efdcafc8112b299d838d3f2dbd159ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e93b04f042c8b3f820072b7b89b898c
SHA1422df3b83a5dc6a1c2c702181d1483fa34353bee
SHA2567cdb546b21b30d42468af40cc5cd21658df12d81d0cf3fe0b8532a7299ae94a5
SHA512b73d5e6bc2887c44762a96d9ddec5edea802df53adf423dfde52789f3f433414279c9ab65948fb2399dcf13bfc3b68eb35e9f69b7f2496678570c3ba31aa4904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ae3d422146599dd8eae4288b9091b9
SHA1cbd2e3cd5695484b57cdd2c0c472883e662cf7dc
SHA2567721d8b3f4b0d192570e481b86d98ffcb5fd8197ffe10523fe09dc6048fe54f2
SHA5125181b1d7415365c79a87dbcc3e26ccd2835a1b1ff2808416ca33c64b72eb618bc35577396c0283b06644695aaac0eb7c075ff32630c79f082d0ea665fe1c9108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d7f8de6f72c5947bb27070becca9d7
SHA12a538c33c0d12fee5b59576273a9ad472fb5bb52
SHA25601acb9f9935872f443f7f2a35877453425bb3223d039240516a374ec1d1984b4
SHA51213aac0ba6c60684592b427bd1f75609103692f8e18682a560a20d2fe1ddfc5ae24bdeea148b3a9f5666e53bddec97888ca00e8c782f20e286e519c903c5eeef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acba0719fb34fa3c9aa5832712a33dd
SHA1613a06591a60b71c3266347b8e3734fa1cfed36c
SHA256d91438cfa4cfe3fb87741cf4d9d4e1e6c939a9764adae658bb1d07a69927d0ee
SHA512d87588ec38db1e7d74c4b211fa0e5d228054646f4580490e9b8e4ae89bbde797c969776a1954b99d118f6057a96f5b08555f5faa8e33efe7ad8333bec4009147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e1ef1934b466f99f70eedb1316da58
SHA109354511c2a3019890300e35243ce6c78d6bc8b0
SHA25607c20b57ab6591a6002585c5c891344c231f066f13f4095c137972c38541243e
SHA51273b2d35fdee5d32cf7d348ad2138a7aa7e5961e97873c665f5de1327f6a7469c7ac563f86b0cd1b8bd8074978b867d2f76e3c80495db49df1782c1ade77fe28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b04f9546787aa2509ba71a331c79792d
SHA1cbe6afb39a8aee2981c309c68d77923b9575d5e1
SHA2562fe6cb5704433b606eee80d88960a891cf2ff536bddf78280ff757605b1e14ef
SHA5124708213ae5a611e8827d99bfe636ef8ffe6237ad219d74a2cbd76e1f71832c57cc68a45d702a0c46de802c7f10cf26b6fa8d3e43f9fc7dbdafbb19e90bec3b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec19931e363e592823e181334b1e5e94
SHA1452ef497ee99f1cc2d98fe781cd418e2f6d06602
SHA25626993cf0837832e7ca1e29590c5ea721247c0b134f1e873d3621f5dcc0238d68
SHA512b703d66a7569859f25d5592dde4b742a315c4478ff910ca58d5a92cc5b4a91e17f6f4fb97a06e6165fc7c55f7d450c551fa3b88f87577054a1ea5e6d2e9d27f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12c3e53a4828e6b670d04515e674472
SHA1b6e0a3e63ec2288f999e514705cd95c7591f63db
SHA256f91b8cd2a47eff062739a57ac716c8160975c5aa53d1ea4d5d6b6488c2fd7523
SHA512cd2298d6139ee7fd23e294caf264da970d0a71f82d3494b3d718d147a033f2c59d3743a780698297ccedf43641ccbd47dbe3c19ef1068f19fb0dd853b99a21f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181cad67411a8365eb87250bf3d48e6f
SHA1a419068f9d417818d48346abb0e5c748ae721f6c
SHA25609bc0ae53f4cbdc8a61629ca83bfa90ad9fd3657a337045add40077c16b3dd5a
SHA51245badc39f7eb42eab3c90a02449f605dd38fb72c53a139aa5b6a52981449f449b8a7c225602623032485075aa36eb17a6d178f2a1eca8c13068293e70b7f8f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907d306f4b1fe3c9dc372566f43c83fe
SHA1744655f3739cf3f978167ecaa42d3a724cd6927c
SHA256e61b17d6c9501b7bb90e8b40e38770083630c5bb9e79710bf04cc803eb7f228a
SHA512b754323e61a269e9f4c8b7c29851c5145781ae70bb954a4fb4a4bc2224ba777057e9a6625907070472567e7fa031f297ca53534bfc0139e4ddc4c998b8164320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5bdb57bd484c31b341a581490f1e1f
SHA13a1ea9a25ef1c6c966bc79aedeaf8479d7367c7b
SHA25694466d80ac30f4a8d86ce00698dc7c60288fedcc19a039f3ab7ddc0bd103b995
SHA5124425c65aeffbe752c4dee60f2c58fd27efcc3c2af389ed62ee99e7ae89953b8e7d67a1e23a590daaf79ba669365ed7cea0d9ff7924fb12ce7574e221c15d1976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed9a615903deabab0c4aadeaf975946
SHA18c772620dd5eb3b4fa3a935adff2b807f2f6d290
SHA256131a23de9afe9bebe485fe6b10d6aab03f655fa26ba1c99382374fd5137757b1
SHA5125b27bbfdfcee4bda1ade47731dc8984a96b7e5c0ee46ee4a0b0ae40fae66132b871593e581c6c835955420c69ca045afc9fd933611606917101552fe0bda491c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5164a30c7c57b70a12712039b732303
SHA1ea1462d815d338be3e906804a314adc94f47b626
SHA256e78e14c0e0f2ab15266f9867735bf9f2bf22a270af0b03dd23df07e3314be589
SHA5127dddf75a9e8a9cbd3b57399c66a54578c7b52415973f334bbd8beb3359b83430a14d5d0a2e025efd524105c1a61a3164c3b6e3891dec9e8e52799719ba79c266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb99da5185abaa8c7c95b056521d770e
SHA136c286cb029d5ae7a0c71dfd4c6e3e3a2191378b
SHA25676f894aefbf8a6eafaa80fe344775e5af84a8712a36d6934947c0f8eda83d9a4
SHA51240ae5e684908869ac9a1043af737d7446f11cd17708dd4d103536632f388e4acf5fdccb3c0f868febbc44b19418d6661d3a24e0ce68aafb0679abb47a9ef9e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed121a11d1241ffda817f8e6eeb9848
SHA1ec13d1bf9eb410ed64fbcb583731435d65e41377
SHA2561769eba001b160b04e338168dfae5333314257ee097ccb60c5b761dcae728cda
SHA512187e87893539a1515f8715192a0783759add9c66df3808bbef8233c41e86ca6da6ebe1b7e9e150f687b9a02523c4d68300de70e38ba70d62dfb5a20c5f11b504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1ea6be2d2f051b863f29d2bd90759b
SHA15881a9dc12f97daec66ef5d6f24d76a77d3ed7c6
SHA256069d94c2da5ee7eff35310ab9e8f9c1b32f289f6dd84956ba1f6e5f95d26b958
SHA5126e37382c820e1e08a173474cfc66ac35ff2e7a62fc0d66084f4949cecff62f0bb48d9a9e18ab84aac94ff324b0fa2c10c12d836c41482baba19e5827c87aff48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555aad5518e2377a96e9ef4c11d2cccc5
SHA191045d988ae880c9d79f223ac5f05465d2c8ec25
SHA2566a536c5c3d5c7c09fc5381a3e90cbb087e617b5a2d9801c290ef6c6b581acab7
SHA512f711f3d56ee1b1ce6210eec026d763fee48ec26ae49f4eeb3b80008fea23d36b613b83d9962ad5fb55ca019b37c6aab542381859d4738326dd592e77bad67a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ffb316cc4805321b47b1527efa317c3
SHA159aa3640e5831da241db75605367824bc5b96cae
SHA25636cc38001b52bd745ec663afbecc758c0c5dd053feca6cb20507f7c3f128bb45
SHA512fc7f2c71229cd6ddc45cdb20f62e373ffd5101155187037ab2909609a33505f8f5ff5c682bfd0303425925037ca5e838878177f30e1ddfe89fa343d682aa93ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b