Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
dcdc188423f494292505f53b8143f6a7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dcdc188423f494292505f53b8143f6a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcdc188423f494292505f53b8143f6a7_JaffaCakes118.html
-
Size
246KB
-
MD5
dcdc188423f494292505f53b8143f6a7
-
SHA1
d711315cad13e6f1f6cc2921210bb1ff532db381
-
SHA256
c699d0025988e8ca645dc4ffcad4707c7f040337a933b3c03a5ba6e0d9542fd3
-
SHA512
07ca12017305045f76c65d03e9ed3f18a71e800f4907e77581961f32ece7b05ac76242ceeab1a84d35478bcac7370952f2495f4ac4010767755430815c5f2ece
-
SSDEEP
6144:S2r5WXsMYod+X3oI+YYWsMYod+X3oI+YQ:jr5W75d+X3W05d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23750991-7139-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007fe8b43978c908c9feb8487bdb0a6342fa6497e38beb707971982f4b883bf1e1000000000e800000000200002000000082dea05539db5a1cdc517af2710ebc21a4473c3d5830c2fc75c5c12d73a7478020000000dfa2cce0053f9ba48febc6fea04771e9adb742c48c5cee3e568fbf94d98a9e34400000002688a5c10f49bd28952515cfa864905d65469cc53fec367312ca0b4c664b6f6eec3905b7154b5b7c4445843453d46d90756aa6ab15a1518fa150f1d84cfb110f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05b93154605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\weibo.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\weibo.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432329437" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcdc188423f494292505f53b8143f6a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feafa24c22129a079e3fcb36d1602f09
SHA1b0008e10faf809c4dc986a3d131c2d346b02fd64
SHA25661ad11135180805d27bd4ad654c6577d523efd3ca4ef865247556f55cdd804ce
SHA5121015e51822e34065d185ca41bf394776548faf66330ad80dc33cc0ae30acf2eb813a80b8508cd0a4c5aa07a38129a1893450ba5ece31982d7d517fbbd8216ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b9ef8467278f7b20bcec822bd138de
SHA1fb8afd10b183fb65c2b52597ebf136cab37503db
SHA256cdda9d14169c86acce4d53ffbd60c1bdd39e5e880d8e6095a0de0d238cdc97cc
SHA5129428d31594b0baed43da96577c8137a2eb3c2ed70f3beaf53b147fb10c37cf909ab49680f5675f988ea5d818df8ccf8ae834a8b84e1f0bbe9273b273602631c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621594cab4a77b0a754a49b9ba8e40a0
SHA144be11e8f6bbe4ab3f4d5ee76e5229d6d58acda5
SHA256eddf7bf2caacaf7ee57ada8820ece9572daf7215bb3bc4ed33f8adf078d498e2
SHA5126a5b2f0b815ed9767ab82957910e4702f1829c0dfdf850729cd8c3969ca103d0ed644a3351c493fd186caa8ba89b8f29d1804bd1d2a534735c78f86d7b60a58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a3cb27e053b912f9c724fbb15cab295
SHA1a7e7850d0e9cc83b3c89b942c9188ef729b66d9d
SHA256f392d99f1ccc084e76d91af33c5378bec15c556e60761fb4babb4f7e6347a602
SHA512153020ce3e8ffde515bf700525a9b06e5a1c2226cb84cdff446e97cd21b525c6e3798da6ce39451da0b5d922778bdfba6282ad447d7ad562f3d1c903f7cc02ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd09adb2a9129b3aaf5f8f088847bb5
SHA12ef38cdbe5ab8d82015ca5c0be77a3d847af2d6a
SHA256ed328ac725d20b8d2c3354aa00cdfa801ca85a646551d49b0e3cb7f88223084e
SHA5126682c53544bd795dd1114068b8122d17a5c9f77bf0390261d74cfebd8327e9b1829b32420ed31dae1602e06144a99c4852b91a847dde28606ddf509f9477eefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682a155757391682b91f64c2f8592b91
SHA16727ab757848b2b73d6d74be608bc1d68d06b9b0
SHA2569568d475827f546b909b9c6c49f83c50c5f2091b05620eded5ce42a37b7de508
SHA512443131e78d6610173115b531c142374b8e3f40231cbdf43fa4918109ddb38482fc0c2291971504af6bb5cecce2ab4d7dc2c6712c56e4199507961bbefa1176c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aed1f1abb8088e8aba133255a10296b
SHA18f6b8406f15b6676ee0a805e83f3cf5aba25acbc
SHA256d56b7e0285836cfe30dfbc9c8ef316206d4d458f06a1ab21979d1abb47c92413
SHA512d16123aff4af5d0b66c3503dc99ae4ce6070a64c7bb60ca149514e5086b20e12d6ccb31c5f979c30ee8881e35850622344d2ff912b7866cc15b5a1a6daab431e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ba303af429a20e64018b786f4a160b
SHA1bf35486a7f20e1f6dfb06a693a0e9d46da2f5ea4
SHA2563aa9dfb57dcd1c2c652305182c114599008f99c6cc443d1415a890149d4a3df3
SHA5127d8dedcb2683ecee80555711db1c32bfd4efa4696d514dac64d2139fdfa5c6309620c29f345b1cffdfe13cb11c45aa9bfe4a64fc67e55d62cdbc36174053c76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc089e38cc5e4fc54541f8b7090f2695
SHA1aa7f3ed5dd83cc6e43a2bcdfd0cad11d03775e25
SHA256cc2dab654b0a2d89d625035034c2b5b1d76266fdd411479f36264f65d71449a3
SHA512de28bb7d3f417e4002deddc9c960e5c5a64568b4a04d14b629ada71a8b068b95a27a1ef0dae0350e26c982eea118d221a40242cc98c357e9d730b50bcb285eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50faa32f66e4996b32feb6ea5fc38ed00
SHA194529d8ac51337e2a6a07fe1710f1876089d41b6
SHA256697b59fa6fb9c409aaeba199af28195cbb7f67f5ed8ab933e3e5ddfcadbe7efd
SHA512bf9b635f443f2d0f917398184d983ef40a1041713b12a0f629355483b33ea615d313dc6c099d109e43544f10ee113aa3da13e684fab0ff60f723776e2de6dd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57945dbe1309c7b720ae8ec775f708a50
SHA12a17761a9f70dfa43f717efd3e0ffb013bc4f041
SHA256562290e4dfe6bc0ce6b8b2bc7cfade419208e0b0d49ba13f0b3b1778acc0db14
SHA5120c82e0f7a2879955aa2b3a62e50b445c612e226867ee75a72d26edae03122ee985b7809acc0997dd4fc2601dbcfca65fe3d88dc4967588f01c5c5016268b0eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e43f75191c82a12c73bfae922aad404
SHA1c36804a90e7c02a85b9bc4fd55dcf20018891cc4
SHA256dd8bf6779c7b8ab662584c1adbd799ccf01bee46228a3d4c80c3f273b5c7131c
SHA51289933ce7f7427fe389a947dc453b78142a642a54969bfbdff38704959960758a23a68f24dbf37b694ddffd61c7b94f835aea93d3d7a2f7ed1ef8adef18144a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d94b0a56b97553ded30c11fe34932a6
SHA15b8014bcb6ee9a6130d58ff4b15837669a12ae44
SHA25678a8718797ade93fd7036f28212f6016e0f12819b3299a64a06c197c860a25dc
SHA51279e5e40cb278f2d65fc4140740a2a5be006ab8b6b2946d0ec6d4ab0e11152c886866b4af17eb36bf81a5d4a4f64cce0b7b31c26ec4fb13679c87848afaecaef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954ff80d353930e360acbebedf480da5
SHA11da6bd1d7417851efcccf391d5fcc0690280271f
SHA256eddcb18ffce81ff9232c9da7cedc5e9d89d9f848818dfd8ee8c8f9fc0950c51a
SHA512c965b57436579edab40ea18ce998a0793b63b47464ddfaf5e1b334dca6df55a4420fee3a79bcbfc47bd246d0e3e6eaa9c3fbc0ee2f0c501afe11c3c83d8fbae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512de7d7e435aa57251ed7c81f45c6113
SHA18142fccfd96666848f521dedb1088a95c1059cee
SHA256507041f30896f7e3221310cbdc11ae44ea02a921e9c34f92f5a29b20a9607a60
SHA5128b0e2b8b0d5ef7b1623c8bb72e1c8e5516fa046eb96f4c7a823e661d01cf62603939349c0ecbf7e38edf342c1c89d7d178cdd64949beeaa69d5fea664d5bb01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1705ef9b5d780c0bc519e5ac4d9372
SHA1e80f55b206e482c19a2f4fcf2a556cef4434b9c1
SHA25626824c9d0b3855a012d5f31d6b6a87a64f6584acffb81448fbb5fc0fad272fde
SHA512d145401f880870285cddcbf6fc2c8ed971da4bb17f54d6e60b880a68a6148881df67347be35cc3f57207510e146132a01df06280f6f43ebc5d50e50e1c183e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c41db9613420bdc3ece7f2937fbae6f
SHA198d6ae4980303ae262a03b5765d39912b1b7573d
SHA256a172534c33f0101826eb89262a6e5160ae3009c9c78743f4cf05829b9141ff34
SHA512e531413f2e7fcc4cd7af2e79051bbe164bb24abdc1ff81deb12aaf7f9475ed1c261b6d3963bb9ccc51d64e000a4c73c2a6ad181e628721f6529e5b8613daf94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fc1bd0f3ad304bd58b430fca376991
SHA1dd7881132af1b7218736651a319312525c5c2390
SHA256ff8799c85e7a136ce32c1e705680b8941801402ca7646fdbceec9eb4759f91d5
SHA5123db6c88f3586c0b23ef17f9fb828ea81eb082bb2c1874a4208b4fb3544048b05573c23e75c6ffb286f2ffcc7c3d413c99d52210932248dc10c62ceba54d1fc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac56a73709b70a6817fd1f03fc52cfbd
SHA19c70f27975d05a11930c70c7612aec54c81b99b8
SHA256c196dfde216a3d69dc5a5afbf2c57e4e7b5e29e38f474448d0bd124eee576335
SHA51282b354e3f051ff6ed8bde2c839a714fbc2eb75568ea7564ef21d499a2dc3d36844600e34d3dc8bb23dda54d613cf4a48a47d71dcec691efa463b3b87ee320d13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b