Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
b4f727f22b3dd1ab20868334b421dbcc_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b4f727f22b3dd1ab20868334b421dbcc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f727f22b3dd1ab20868334b421dbcc_JaffaCakes118.html
-
Size
1KB
-
MD5
b4f727f22b3dd1ab20868334b421dbcc
-
SHA1
a332f2b45bcc9c2c0375de6822c37357d178196b
-
SHA256
4aef80b4de762094769212fd61075e1295e4a88fb06b397f655a13525a2acc52
-
SHA512
5b290d1eb9410e2ec5755fdd5a159cb6d674d9e95b134ce930a46b8f74888f2f1b90cff22164c16174d4731a693a1054354a59240771dd8bbe0bba94891c2c95
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000e5f39b520b169d906df0fe9a44044b24a981d4883518eaa2cbb7b05791a5b734000000000e80000000020000200000004fc00bcb255183e61c30d9c490f4b0f77e0ee086091741129f437d9d3bdcb8f220000000b47cde932618cab319630a7ae64ff895cf29a7ffbe38daf9b05b42168f59eb1c4000000063e05955b12c20a13694e21a02a6a1d353c4be5fbc8b7ed8d8a862b701a2337d64fcc6eecb996f661a1a3dd697466f7a3337a6f96abc938c26d4f64f0de633a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{259B0551-AEDB-11EF-9841-C6E03328980A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000009ea418a860c0165618239cae3d7dde7531470d3dad15d9b29c474fbf197326f3000000000e80000000020000200000002c0f5070b6f20f4fba327c2890720163377afcd6e8aabea9885eb2cac4c0b1cd9000000016c009ca8b13a84a9752d01bcb1071686420de34525ad5fe29470113712fa5284ed728e4abfaa94926168bb3b49bbe07a8f4b64054896db9fa86cecd455ae965745efd7227552039e137623303538e267933ee504ddbf2222352c0d99bdd695ad1c48883bfbd212f92c4bc813e3dadb43c16461988d7cf0ad93df698394674b9537dacbb9030be6d19012d3b1cce055f400000006368328d99796444f84d976111cc238de20d94fb8e781e2f834810d5ff2a5bd5b373cc0d90ad6b1a490f90c1920b317ac2d3dd0313e605c33b1b1d845277090b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439106040" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b08ffee742db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2524 2320 iexplore.exe 30 PID 2320 wrote to memory of 2524 2320 iexplore.exe 30 PID 2320 wrote to memory of 2524 2320 iexplore.exe 30 PID 2320 wrote to memory of 2524 2320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f727f22b3dd1ab20868334b421dbcc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50366c45e8b317c521a91570b7e1c6096
SHA10af0c15629ce463d5270a85492252caa2fa20ffc
SHA256cda865a95ba34fe94819f1c0adb50cdd4993e241067a02bc0d13557293507d88
SHA5128818331149bfb9071ec01a53e15452f49779d1b84f3894b8e4049e941bd22899364913e6f6e8babe2fa1d6017a1583480c5f921c0aaa90091309c642f9c9ecd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258f54b69da789231d2a9597d582ff14
SHA1e5dbb40f2a6b59cbe1723fb5e15949bbde42dbac
SHA256d83c505292767d98b6443ed061beee3f03e4a42ef792de492263dba5c305d726
SHA5120c8c1bf8dc4cfd63881ae22957be6402e711c4d66ee86f928fa6088f0df50219ad24c19d06f7fa5560489bfcaa1198898702f30c51155f6685ef7480e53f61b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3e111e43c9a310d9579feec4663095
SHA1b1042d1d77a45ef1ea41d097781181af69a41ca2
SHA256c166a2783c582ea5eaf8c15d4f0056d203d2d32d2420a3b95b7ae00c2f47bd0f
SHA5125f733170c2e9edd79fe7a950c9671cf7e7dd3030ac46d0b5f0bf910f9cf6b40e36925e3594548b56a6b16634e1b330e8f35aadc0a40edc2b957ec7913c7b334e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bfc92d5a7a792a3e873278a52e72e4
SHA1fff9f9fb7f4119b4fc27e1d742a96a47af1f87d6
SHA256c0b7b0cd6ac9a55aecd1379741ce4b7f5702aff4532a743f2cf059c885fa28a8
SHA512887d47e8468885300dfb1de122474cc1866e697c2226e570aaa5fd069d3df3b859b53cb026a99c9bdbf4246aa4124c9c5bd4d029dc050be99d9709df6b71fa41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc919861c386947c59269b1ced385df
SHA160119a42b0c724828878a878659713f9ec87ad35
SHA2563d7ee1d46e5ff89099cb55ee7bc5b01ff3f57405f567048dd3bf4914eb149a8d
SHA5124e4545ed8d71d01871833c4a0a85ec6915f6c1f426ff6925f1f5356aa60d713e9e2809f5571a3070af6218ce12bc226ceebc64542a9cf819e64a1c172f6058b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea59342f4c1627cd0285d7f4f38e343
SHA11d431a7ff6cdbd79038806537ab6cb5d10b33cb1
SHA25602295fa398636c926da253218a14a3a461aa4af2876263df643e57ae26f1c098
SHA5125b6d9a1a9d370ee2d41084d994240191effd53ff69fe0f243e8b33ae3927ec214d59a03a7deec298f39c5cf63b2509bb37366697dd118e8bac85cbb9f2797564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9bd49ff071a778974a930cc6693f9ab
SHA1fc94fcc295b0a0310950b0fe0f45c1580a7c2ab5
SHA2563def2cb4cba2916e5a9da5162c7b4bc487a84d1e0807713054fb5c1c494c4bbf
SHA5121493d3b66ca003d237c97fa90f4d5f066a7f11a905c31571b4147fe7f1e6408944ab7606786f4612d883327d01a9ab9dc9d775820730d5e9f8ec58793938ab7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0756a85ae0990217870443034899bfe
SHA14966dfc733d51b020ce75e3e8b3f30b8020b5131
SHA25675620158cb7c58f83550db06681a59d090d5dc2cca7de67b03a992e3393419f0
SHA5122de0eaff98e2c9c5345eadd29c8b2e78eede6304f07fbd387a422ba0424aded92264ecc323edcf10a4440c8efc48b68b4f3cd05c87210a48a86dd7c0ac687155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0f0c225de61b3408e9650f2ae9e23a
SHA1086796ba702d254c44dabf745ac331788026c2c8
SHA256d3620fd5e4097eed52528ba81d4c4265d23382718aebff890b491ced1ba6ac8f
SHA512668b47f9305028cfc5873174d12cf17995eda2d2c0602e3bf384919d22d847640323a774b6356104efa1d69c633eeee915e626eb27bcabe31911d3a3bd0d6c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a9afc8fa8815a25efe51aacfc3a72b
SHA153e7d461391e754a5beda0223dbf7910ca5a8a00
SHA25661540d24d87be530edf403675de081819cf4641b9addea21b0151ce0eb60b709
SHA5127b3afa448fd436513039282585eb19aa34a306e2e21ede94121aac9f5d980cc3f760a04c2726a4d5e3b79f5cce0a58728d3256ab173d7384802b036e17b807da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3aa3c64f01a2c6c3f96e6ce0da2597
SHA1fac959baa998ed053b61b44782eada46c7794009
SHA256e3628f1d3833206d206c8736d60ab1051c5e731e4d032f6db042fb063d6b1ebc
SHA51230fb57593a25fd040f641d676eb259609e287b8612436ea9eee6090c755880e87f39a6aaf445cc7b3c61858993ee21863f08ed6cd5c36897963972c9e3b9394f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecabce9010ff64c888c4ae77162ea2e5
SHA1155cffaec54d377e0fae7393cc26342e8a1bf5e1
SHA256a6676e9d94f828e8cebfb374e310f564dbfad776c48b2e561a9d4572473a983b
SHA5129827a022a61ebdbc7989828b58cc4aca7d8e578c3827e00501a5161034d1e4217da2b80150b2352b1040af9406eb6eccd7726f51a96b4c5d9c5a4292a7a9922c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f569a612977f67719c8b13f308cdb0fd
SHA16e43a4184c3deb33ac7d25b4f552537b95040f26
SHA25672fa3c92c9146a337986617e089bcbcfb32ba640aafc2d4140ece2b3a3084241
SHA51288b33a83e820ec25aa6cd1d047d5e0b758dd5f983183056ef41800cd4165fd458663dcc52afdf667d56c1bfb6ae672c501c04b7ceaf216f9ab441ddf6c6ef8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50908ff2cb2414cd9d94974604e20434a
SHA1f6d746b1dda3782e9c32905afa5096801b73a2f3
SHA256116edd139817d4967f57078c818f8027142a9bfd4ea6005a445ff4a3ca4b4800
SHA5121ad02323f60d702e52262e9b9406d99cb5a7d5800dd0f45ff430543f7c7acc08218bfbf0bfbbe701a79ef722c2e81d5e5588e232d9a24b45680e090ecaf3898b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c608fe26db746bd9cc94bd6ccfdaf4b3
SHA18b6058f93b4455e0af2221c03e5af63ffbe57e5c
SHA25654efc6f5750daa3a8854d89d7b106692e2f3d0f6bc237b8c0db73b9187d1e6dc
SHA5125506b2f6f5fe67fbf1e5a19146c67c32a28217741078a876fbf5e9779508a9910b3330cd58b906aeac8a5e666cb499699299d465ee6f6347df92498c8f9ad52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5948893ff54384170c88fa0f195efb933
SHA19541740f12189cb2965837dce8dbac06e2d1925e
SHA256474d08ecb72c55d7153ac35cc548880b27300a7aa7868c73e976c4a0d750d2f4
SHA5125404fe7031ff99acaf5c677a0605e81b74ec8d0990e89b0e6db4e8cb18e44609c64e524baa6e8b9aacd94a2ba39043ba20c5bf0207905eba1eed0c02492cd8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb2cc0fdbb3c36f97882604d9eafc92
SHA1d6fdc5d9399a25c3acd827c3da77021de0b4c697
SHA2564c893e3ec580589022814c030484e99f0e9d447c20eca1f8d6716fd65f0b068a
SHA512fd1007dd364f594581df4795f5e4a0d9a8283776d36fb5dc58b6530569baa9c660edf02d6e9a447fc13eea6c87b017bb0e4cdd2430df7be796c2c8ee5a9f7297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e472a5caec5612201650352ab4b5349
SHA103dac8a5fa90187465acde66f60ac0836403b6a7
SHA25666a8f156fac58cdda8de9b1a3aa8c50febe8103288f1105be6e164059190ab4f
SHA512e0dde26a6342323f32ecc2b99384313edf2f86d26dd9191fe4a9563fec03b6190e6f8440f0c1d96b6fc5991a76aad69db49df0d6dd56dc76c63667035b4cb712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf399c468cbccdadcb9f078cd162fcb
SHA15811040a6a3eeaa4af38f1f20567de708321c578
SHA256b73c0db3810390e649344a2bdfba3d8eae15e9d63c187e010c3889963bfb0e4c
SHA5128bf8f09f4303cc975ace95d873913f9e5a4b3b1e5aacb47575ee123cb70dd61aad3b61b35767367576ec107c3401bf6ecea132a98225ca4ff7fd2b1acafcf506
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b