Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
16bfc2c0c00a752bff72f56f51550e2e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16bfc2c0c00a752bff72f56f51550e2e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16bfc2c0c00a752bff72f56f51550e2e_JaffaCakes118.html
-
Size
53KB
-
MD5
16bfc2c0c00a752bff72f56f51550e2e
-
SHA1
5c5153b2c7ace32cb531e1c196a770bcec2bd690
-
SHA256
6150e73d75b0a0286e5cbf608ca8c1154fc1ba18cdd4e7b2f761756388e89bff
-
SHA512
20959c08292520c1d2970764568ff00060ef24d6515661bfcee9a5b400a60917f937259cdbdf4efea2dadeab763c10cd5e0f86dcb74385d13b9038ef2f40e26e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUirunlY863Nj+q5VyvR0w2AzTICbbooB/t9M/dNwIUTDmDw:CkgUiIakTqGivi+PyUirunlY863Nj+qU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000009d7322aa86ad887be6c42b0dab93bb952996e7947d71b709f5e678303ed79662000000000e8000000002000020000000f8f57e6e05a33cb0a9f986267d9abf15abf8aaac60bd51fc994be8b73581f3062000000079aa98a3d46f456b2ce864f0d1ed013c92c3118ca6c64d5cd0407661537c0799400000008a2411f1268360fdc147648e89113dd3d439c9e2575dab1d87b6e18d937f68fb938e3b6a4023c601555e0fd90d87ad0dfdb035bd34361a66ea459dbc35b99b58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F8D7861-82EC-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ae0005f916db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434275506" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2764 2648 iexplore.exe 31 PID 2648 wrote to memory of 2764 2648 iexplore.exe 31 PID 2648 wrote to memory of 2764 2648 iexplore.exe 31 PID 2648 wrote to memory of 2764 2648 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16bfc2c0c00a752bff72f56f51550e2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb647d0103a7a9d0e5fbb45eb752114
SHA19265ed093ce9819743929fc5b1f6da539bfc0914
SHA256c2ea1b64866cdca2b74fa48075ad1a3161fd0672927c79c5be088207d58e46a0
SHA512768892bd47492766237e89b99c3b64912d6f2cc09404c7d0d75c4e48a4fbf5646094cb653b9e1b19588234cdbb88f63a906164b3c5e4b01ce8431166b4f0abd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d9628e25bb3cc3f7a6e7f767ac1e3a
SHA1e8d8e4f152a8316cf4b5a8e4109bc07c306c6ce3
SHA256d6e2e22a9fc76058b4b6266c04def7346b34ae647ec4f1fd2ec39b94ab6bba46
SHA512d44959748a88c5a6d982fafac2b4720d43a8283f79ad97e44350b5e103a289391db6286a869d9c245f21ebf60d6c1b8eaabd5e614a972752fb6a2ddb6d339f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55076a8b12b2a6c4db4b15760f69ab5cc
SHA1efbb77b8b0d97498627a4602b7f13256eb053cad
SHA256785f25e93f48d246bb58082ef0d14ee58917d2fd56b4a5289d89d4f049b6b705
SHA5121a76ffd55411dd0f8c3c57b35d5afd06c2f3a14380c969f0b995857353d9bd507e2d516dc5ebdef790d35994bf9ec719371af3ffc07613e6181c9c1be387bd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569aea9bc68f9cc5aa6b703053543b116
SHA1d47986403f327ac4f7adb6b873b88ef26cafa4dd
SHA2567a8c09b355411d4a838f1e12cf2f9bc84a29e9b0e80f831cc13da60765441566
SHA512890606554b926a059b64f13141e2bab251ab8a5d32a5ffcd03440085ec913e72e6fba79dc497cc337eedfaba4c2895fe4afbd44af8faad98ff442c5333f60923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f046dc918253023e5e4bd5f6cef0a7a0
SHA1fbed7c3dc4e48d12b1a646deb49c9327c4ee15c3
SHA256575f26115db69ab86a8c008fd3feecfcab0cb04b98054e59d899c5dbdfd828ea
SHA5124b39809c36092466029c39db5951d49e937fb8535aa6591daaf597003227fa265ee6ed0e9801efbaab9644d3367263bc0bd0e2c3114055ce39715452a0d41ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52642d726b0c649917acf1c0d62ee08
SHA17241aac71c55f2d76b9ea093d42e309c0058a206
SHA256a68636e61d2ca2a8ad9845d79a22cb1d6e615a42cdb5e687a5bdc8a3339774c7
SHA51234b453bdfcb0eb973b3564a9311ae4e0ac261c212469497109f1393db4e865bf29052eebcbab787c650218192a9d262971a8739e83587c4868f4465bc3845ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504addcba125359885dc83abde7223854
SHA16994419ac8e56d6cc8d80c8bbc7d0748a34064bd
SHA25681b03a633fb3ffd1868ce1156eb7d34d44bc6f00692bcf43e63e02d6c50ac72d
SHA5124a6c265afbfd5f34a736776fb8b556bd463e926700885bda12ef24e9d175181dfb57e12699198d8224b462be2aa5fa7ae3b81f926fc372c0553a4ecda2408288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581bf9f04ef570288d63d32562995973e
SHA13b5a564b4e9caabf28f98e3fa9644ff9a67e4d4a
SHA2563fafc3df47159fe4873e1209942da29f2feb070c35164e86659a457870297878
SHA512f83906bcde5ce31819d01ae1ee485e8908b1d4c7548858556965e7e36ffe4b3776defaa368dc7a9541ba919697d0c84baafbcba06e140a01c0f0fb32dbb84dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109ee8b6cdf3eeb90e852ba3764c2321
SHA1ca7c2ab1a7cec8dea5791abf93672ba9209242f8
SHA256056ec26857361250f703c6c8c5a9296f0cdeb7d80bc95cb35151bcf184012ab0
SHA512bae141cd4b82f0afe4387df6b47b68260104e1b594892d5f03719a9090215662b2b663b31320cc30fcd0f4fe7f7e769dfafe23c8db27bb58dae251789646301f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63eca5fcd0ed52db647a2d9af51315f
SHA18ca3c011606cd355b708fbc1b2067687e5ae4cce
SHA2569fe07173dd18c81122f0464778926a294506de140f1065defbce606319cdde7f
SHA51274af2c3b2b8e114fabbc80dfa0f26ab86f909e42056b7f18a30847cee9e97a05ec1254ddbfb7870b5cabaa5be0d87585aa7abafa323030f73197e163ca3fca35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd4b7a794c110e866ea2f3f9e1999ad
SHA1378f4df47f1d5c5f8bb979f112de83589d72a3dc
SHA2560b21be8bf47b60318cfd185a871ff830afbe9b18b544f9b0d8b6d7e8904a3073
SHA5122e6d36b491cb4b07e9af41547461059762261cf6185474f1f7a601c763167c5a5d6e58726f27237c8e148c90a09edcbf9a2de1918c340031f7fb09e8e9d4bf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56fe718d54ae2e5921389d42410260d
SHA1fb13648f411ca0ab2e87e517baf298239060eb8f
SHA256e05f86e4c348e7af07d00ff8b5acad7bf2ac3100ecd70ee750d23ceeccf071dd
SHA5128989421c167179260849142584047119866ff3938002e645f4fd795dac0230a5fa20b2845365886625805231caed63eaba025d9103d031bdb72d19fead10f712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae96c3094146d7506ef8a35b4653e7b6
SHA128a972e03111775f5b034676024fc77d53703f12
SHA2561867129b4274ad791f4042256f564b038ed98b3ec7bd8afddbfcdb32cffd2f77
SHA512b4fe6d9ad82627707efaa4d3e78922978730227935685a05fc24fd152fea53de4d3b9d503d67e46e0d2f87e30773ec0768620a54de4232f1f79c5595919ccd55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfd711330a8a12d74438fb4c470712a
SHA141f451f33b783b7bd953720a938215af6898af0b
SHA256f9adea5fcacceb087df0901ad8421900359b67e727b3a8ea69a29d716a882d3a
SHA512ed429ee1f7fac41072e78cc36d13e27acee45cbe67ee17377f6d1e29dc390dae616d72c889467d0eaaf6fed72b9d821396d7b9aa361f527dd95685e24fb7bcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce1308002ba1b6da1c4514593873428
SHA1ee25749b7aaae6fc8b76b6f2a6f4936e77dcc349
SHA2564d772267db6e0b2e49667ea08b50263d97bc094c43b3349cc74e32cd29dbefae
SHA51271e23a1587fcdc5f61b0dfe423889679a701eaf1b5c228d8bb7ab876b34e92e327911635791a8fcde454212d00dfa05ff774f56696f4e5d93602fdc6630258d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4ddbb47c15cd21de3aa8f711b34d06
SHA13a6051c1fb8dce23425d90b3d0c8a4af030e74ed
SHA256fd1765711dad839c351913de80f4a202729a648e2f3f692579bcc18028156420
SHA512fe02f86dc6d1f4d3f54954257729408608b0b50303b9db9f732793ea9256988a565de253965b1f66cce848993b8b20779cb2a5dcd39661371e3e16372fa73a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e48b6edde73b699b93f2e357edf8c59
SHA14f3512ac99cf97c319208f2128a52ae145c28720
SHA256ce58d5e41210f58d2dea48ed64df0f4c95d2ac53c1426b6ff3f9771fa55d402f
SHA51284e2dc1ab73997f97274ab19abb15efec4a78c0e4207473858cf34f3d64044abf089cd052a8ec3d45836e5baafcd539bbb350c53e3023328178b8e0590992dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e38fa48a8e3503f62dba4266ea4539
SHA182c8ec72941d6e9dba8b8d8f7772ddc787a374cc
SHA2564ef4cf1828e15e0382c8f5b50e7420ddb96cb9cca457e8dde4277c95b6e260e4
SHA512d1696fd6e1d889c7c3e68828b9a101fb61081eeb482fb3e942a41fabafec404ac466f88367c13a247bcaa03d06e9960b3ee233dcf076ed3a563e32440d55534a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ab084728bd24a0c9dd37178fdf4519
SHA1166cdb3b4b31f8d2910a57356b3e07ee23949b78
SHA2569b0bf6d15eacb142c7f74edc5e764675599226977bb33d28d2af9f561d61dd9b
SHA512f93233cd45c34620f46ad9c82b0de8fa831b9af741264d1ea0e9a0160b974ffdc54eb346ecfc8a4a3640660ed7a54d30fe1a8520a7838fd0923042359a910d1e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b