Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
ef119abc487bddc177aaaf73a590d7b6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ef119abc487bddc177aaaf73a590d7b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef119abc487bddc177aaaf73a590d7b6_JaffaCakes118.html
-
Size
30KB
-
MD5
ef119abc487bddc177aaaf73a590d7b6
-
SHA1
2569fd6fe1315382dc88d22bb695a6ac063e6009
-
SHA256
ebc403098452d483b2bac26062baaa299a300c62ba3f3e017562181b6ecf6ee8
-
SHA512
2d8bf6d3bc56349f7394a9ca93f09730557c293145dafcd9bb1b7f445807489d7e585c9f4279dcd5016770e59a292a2be7c8b941cad7abc93a3f8d86bf223902
-
SSDEEP
384:n2FYOh9MOh99ILgfxoCzNJv/YCijUB5slyQmFF9YwiYv2w:gYo9Mo91fDNB/YCijU3kyQmBYnYvR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16E5DFC1-77D2-11EF-A641-5E10E05FA61A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433054835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005962cec6513a4c6e440148dc6ce9fa1f16251f62ac47962e7781c6d84dd3cf75000000000e8000000002000020000000b859085669e6e16df801b3c3b88c3ed07c1da68207fd345a313b5ec55989495f200000009af33192b8fe65332b08bdb631dcaa70702bf59a3b819fab2890e53b8e1041d140000000ccfa58347442ff6c08d0cf55177c50546fa9c0a6ae2d6a139774b310eda21fc1912f85c154e197e3692ab02545ace8e5ea7ce6ea149f47885c20c7ad4c50fa28 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00db82eede0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2800 2004 iexplore.exe 31 PID 2004 wrote to memory of 2800 2004 iexplore.exe 31 PID 2004 wrote to memory of 2800 2004 iexplore.exe 31 PID 2004 wrote to memory of 2800 2004 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef119abc487bddc177aaaf73a590d7b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7db1e1d2847dc5583945f823a21b4b4
SHA1dc1878e93aa75cd185edc692067d2aa1314639f7
SHA256bab883b97da66aeccf4b06c92b7e5d3bba9519f3e5d7317175211adf80496c52
SHA5129415d91bdcc91a26c2d160116c124e68300643ab3d23f5fd2f589072ab8ec3a8973d15b3ac822a00ad3e660807353ae82ff190821906f5928770ff3b49cf0c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cd973d9784a4976391edaf334b494c
SHA177d544660631525be56e53c36af1b4e94aaf0395
SHA256a2d65addb9cc6325c9a043976013747f5b45f654eb06a3f550d364fc8a0c2fec
SHA512e0a69b0395762f3da49ecac61eb49de5eb40f5f123cf6a9a7ffc596f303d60227c6081f5f0300ea26a5c812b940b6864a8ff2a43ec49f044e4c45f4f84f183ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5fb07bdd3c653ebaef0ed3f8c4f927
SHA12e6b7c291cf4095d26da7f639a430c99ac590879
SHA256bdbf5dc7a9860feb1af0885274d959e1a3b45900ce825053a8a24ad35a590625
SHA5126bf3a3a6ce098d6ecea4c21a84031e42723296dd658fda8bba61bf76f169047efbe9fe594daa78167e4aefb96c05cad64396d8a68f23f09983a2239a2d8561d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d62ea4ee7c3ad444d4a1f94b2368242
SHA131cb384255cfba61ad6a2cc6ceabbd84a8b7c6a4
SHA2567866f12ad4350636a25be70591fed80435bcbd64bfff460ccfd896d63c99a5f1
SHA51285acdbb86559c318b27b62c4a70fee8e6ed9d2708792badcb657e989070531036dc2b1fa47113302c0c2a03d65df85b429d8e69b75a314dda7e9ae7f3b8423e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a53d8345efa956528f361c1adac694
SHA112756b6a6879de08be8e2cca86d002a7f1d07e47
SHA256bcfdc52c3db47dfa1065257f1f6aae40a709c924aac167ec2ed90969f18e3fca
SHA51280fa10cc4c04ba6ded0acfed7628184471788a6170bf8ef85d4a192f814195343515dfd1ec81a06fc867a2db1bc16641b9c65898a8b15d7804a8e0a10370fb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7efc4e360a405c83c789d4892a2bee5
SHA1d0e43a3f54e1221c2d3904e0ea80dcf7fb3d8077
SHA25690795c0b0adf33f2d718db2a819161637d3b777274eb1d0dfbbf139e9ec1bcb0
SHA512f913d23f869bb4d8cdc833964e6457f51efa4a0490415838d9d7563d29b1823ee74c3070d9cc702f311e2156ab649652dab7507914501200914650511575585b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14b4acfb569e21b6028ecf2f23859e2
SHA124be7a279d8e87e3480c6f20a62781f757063d76
SHA256e0d8351a983df5c1e95881f85566f367b7287de832d9ae2c8b724e040f642365
SHA512565ad7ff5f105e6390978088dd991fc74b193b56ac5598da90d83fedefce0d0a1012ea4cfcbd4f6d2278733a09b281ac1d4587bf449e954b02d061f815246ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532532f912fe3d35891863ee9ffa8deb1
SHA18840f4af172e1462efd428486696c0aecb964ef4
SHA256a6fb8d04e61d7856c7f19688a35dd19d275f9a49e17d72f5a599f27d194734b6
SHA51275f4dc04011b7379f419d4c85729a317b53b6218619cf3dc1c48cb39dce678bbd3491aab4cf0cc7760a6c445a844449a5b363571de47e27f20bcb0a11a380c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c2c3318e2301b03c58b4df5c9c103f
SHA1e0f29741067e9f6388ef182d7533f9af203ed2da
SHA256630c8edabf6a9c5854894fbd235e103aa63a320d03ae61ca548e4b92b5c3a63f
SHA5127298f9336adae037f6aa6dd2c48dafe8f0344239c6d5978191711ea3bbd7a4f054e487fd7dc4ec4218fb0e9ce11c9464ec29941bd189cc292fe6ac7162140535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5eb42936f8700272350bd3335d736c3
SHA1ba07ba98e51d41ef1bdac018acd507a0580061fb
SHA256f9b98d31b4d43a8976d0da7b71ce072e4e6d5b0cd07985aa6ae4e1ab59e5da10
SHA512a18ed52bfcda15ebe80c15c0e523a47820523725eef1f6954c16dd0d165d99200184ee9f31f8ec1ff5acc65ae4af57bd01340e7dff8f3bb678ff3efc0f364572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68ff02e3b141fc8682912d26aebfc16
SHA1480e3ec2f8e25d2098760e0c7b82b7efc79374fc
SHA256b19a6ef4b29ae796d2f2cccf625fc80391d963ea2796452723ecacda10341c58
SHA5125bf52a10554d9f1a87df3dcba03be1ac2d2edb5cb6c469fe9e82870e79e6fb24fd768da2501516ce373f177c4d49a6cc2d1865b5405178be2326a7ab061fcd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4363fdc8cd0b5f19d88855eb478936
SHA16ba56e06cbe93e16571759d56ce84bfdcaf8ce31
SHA2564f1de95b6c85bce3ace8ce0bab0a0c3459d94bf48475a673580193802ac783c0
SHA5125135404a24eeafa34d87c384aa8218c147ee2b4df94e79b0761359f6c120c482f5a67a74c81fb50b60efa8b0c62f03e44384829a315a1526959f48618af13531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ae6563029e1b91c84a87c4f2b0ba59
SHA1940ae3d68f7f2c981eaf4d1f53ab9236b364fc4d
SHA256f2107c3d034a019773249e726a9f6f477fac4ab79296200199e13125a5f520f5
SHA512b1f7a8d0eb2fe55952ea988356cf93fee9f2145fde120b3214acdc68a527d703fc071549ccf90331d9e113e9220424737cc47568fad4783c401aa5eff83c9ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ead1d7ce0ac4f43be978990327e5469
SHA127b7b9225ee9edadea31b7ce70508b398aa1b44e
SHA256bcef3def8950a10beddd13974b2f2f6fc24f411378948541653674c06f81ba0b
SHA512609021d3b80d1633ca555f815bbfd18ab82d4e617e0ca620f577dc75c06a60ba18ff606302f0636bab647ced58c28e87a999ad750aa42cebd1bc2f8a64969636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd35a2aec25efa454eab56afa123e231
SHA11b8c0119b958fdf4b2f13ae365641a37128b569c
SHA25678373bd3a49c5ac8ea634cf2bb0b13cf7a5f69fa6abb864f18b2b51b8d0d772b
SHA512cbdd68139ee7bb1bdc6217e04ee793f03e43684a6fe98f64af1a12df4320d85d36acdd56f6f43f5dd7637e11d033828912f090268d7116a3f4b5d81215189f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5713099a22ae00e5a016a2f6851aa35b4
SHA18038063a3bae9946d0349533059c8fe691e8831b
SHA256281a7143ddee806a3876a8242a0a24b41e073773d25f16bf0baedc46a8b53542
SHA512ac9ea847cafab696d36f076cda4e375a914c9214d87fe164e0357af93924f459c95275021209718554fda138d445bf59c21436cfc1abf1e69b01515554e833ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d816f84f7765fa69f3fa07866db1545
SHA120cf38051dc049e25c7a77ba2771c1ae65000feb
SHA256f0d63aff81e8bbaf4fdbad33573c82ca94f3fb638960358576b8a2459f7e1794
SHA51215d93a7e0129dab36c93979e9b0cb9670bebf84710be638d9a810001e12d452d47b5e8cc5cdd275cffa8539c32a3c4135f38c4acb49e2e8306c78e9eca1edf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db0b3213aa2674dd49f8f739e3f8fa7
SHA13103684872ce273fd471599beed2e4116ef22c61
SHA256f1c62a7629e65f48264ded5c8ee4dd3adb6820b29bd7a8f07f049db1f7375d48
SHA5129eda9bf73ed8d0e9247146ea47d7306d12bf309d2571f4a209cec9ab0b5f5476bf9889e0d3fea0f219b22c9e68d32bffc69f29c2349ee9d50b36b2e10116bebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa161e9926854f66b4d418a12ff8429
SHA192bfd9d59ba8516c96728dfb7220e5345781c0a0
SHA256185ca69b28b4f9ae709f7b22543d55a133e3482283493c0da50fe526db511d14
SHA5123ccb3f5b09e31bfb2c782348f37d700882d6be595d2db06e3518b873a4f306c1b035de26ba30b2f383302598b37c30c448c9c61874e371be0897ff6d86283b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9956e84166b9465414f9571b22468f1
SHA1acb80c1296b6bdfee3b9e8d20a2dc56f8a209cc7
SHA256ad3fdfc0f3f913e6696d74220662bad82cea3ce5b4cb8bee4ecf321b19ccb803
SHA5123090c58917e0fcc36fb0142d37cef83e988a23cccc1fc7ba881974ff90fd979de9e1a6ee674e2509b67668446115e073116fc7ae04ceead150f3dee7bade2fe4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b