Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
881770a79210a65ce32633c53f1dbff1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
881770a79210a65ce32633c53f1dbff1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
881770a79210a65ce32633c53f1dbff1_JaffaCakes118.html
-
Size
31KB
-
MD5
881770a79210a65ce32633c53f1dbff1
-
SHA1
963dd9b1538fa67fa4b09144b7cadf61eaf62ffb
-
SHA256
9063666bf818b7b86d9d99cd26f2096525728884d866e038367d6f850c8a4b61
-
SHA512
ff39e0c5c46272de6840720f9d929fb312c247de46eec5debe8ffc70ec3ba6f4754c7ed00a14eaea7d7addb7ceabf15493ebc71e6a08ef771164f0843464b0c4
-
SSDEEP
768:Zcd9QZBC7mOdMw8pC5I9nC4cDxrw3wkwzswAPd:gQZBCCOdg0IxCdDxw3wkwwwAPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429494171" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b192aa8eb7734483e918b98adb08c30832187a72d6e108b8251b2ca9f3383950000000000e8000000002000020000000116334a2ea1694cd45072bba858f1c08c79af36b9df66a0c8d1fada78f3e1ae92000000087ad400b51448cc07238e6aca546ae95d395ba3accc3daa1ff62aa449cc8760040000000dcf8069a20708b9899eb9f03c0906b9823124d5d3ca3754202218d721c62dc7468ee690182d3e4cba6e25cfda18b1bd35ca15f1755d23a20fb1bc7f8cf6cb706 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C533D6F1-576F-11EF-9816-E6BB832D1259} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d89f9a7cebda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2748 2216 iexplore.exe 30 PID 2216 wrote to memory of 2748 2216 iexplore.exe 30 PID 2216 wrote to memory of 2748 2216 iexplore.exe 30 PID 2216 wrote to memory of 2748 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\881770a79210a65ce32633c53f1dbff1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf5e5316ed750a41d5e27f4e46c2ef7
SHA13e63d55ef2942a2f0c9de52ce4902d53ca8397e8
SHA256dfc7ccddd6a55b9372d198ce7c9bd6f37b778364c0195b8e431a0352802ee260
SHA512b2cae761aea26a96e4619426232c7a8fe1579fc70054a70e75d09cc9604fd6f7c1fff619d7747676cdd545a10bfa63163871c40269908ea90d2cc82149347d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57206b49f023ce6ba27985b0d8c675855
SHA17325f80632d515f71361a739ba0a23e479172333
SHA256a862c12eaa1e335950628042bd0f2ac60cae98ba21b16f0f9cc982090e8b33f4
SHA512efbc46e9cc622777f593722cd4f548f4f203baf67164b935bf3c7960dc9f3a11856e9233989eda9286cfe8bf832d9e262a35a221da21ce97147fbe0a32d7a450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81f234bc8029e7f685a7232c6e2f5f7
SHA12a62fd6bacd7389cf1e6e6f00bf87158113a8e68
SHA2564e781a5b4b1d9e81701d84d6499a4d5eff8eb94c708ab318660f63eee9c5b9f3
SHA5121f28f120c0ec2cccb844d59ebd1199f94e7d19df82527390abef06a7a5a87a7d5338a8e19aa8e6a0c1a0c77c91d89d18f49eef1ebab1c95d2d0b44dc884ffaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6c0d7637df95c1f8fb05867cd6c524
SHA1d2c2f6afaab628d51eee482d309ac86f6269f11e
SHA256082ef4659545045f1106660406ac5bc129c3f3e60f7857c369d337abe1e0f1ee
SHA512532fed7057d3df58df7a6db34f808330af1079e67c31cb14f3f65f3d04ca901cbd33ff00c7da98466ac29f8dfb1ad2fd168ea5b918b16af6f8984d0106f3a189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57228b3d76aa7cfefe3c9d77ffdec7335
SHA18d50c9484b5b4c4977804e7a30df382ee6bbfea5
SHA2561c2b821b9027e7a1579f3e91d1dd1897245044398c7f95b0284ef2a7b7979f85
SHA512d5746ca29900e8179a1c04f665cb47e747f1a01c6a8242cb12920724693345670abf2750af9a6bceef813fe8740eaa6a31f7a1f9729294d8c05c985a8c85ba7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62e0691b86c203224a4e0c5bc1a76eb
SHA11d0af7573c30c678bcbd38a35c4ee1726a0d46f4
SHA256c37a63d05d63e1fbd89a06cd6d6a19000ba3a29bc8fd19c44248cfb9a088f5ad
SHA512ad254b425f6cf714513c1e25b7003ccf9e4e90c30de39a0d9f126f14f4f289593e96373d0396a81c45d5091552245355a704babcf647050483796080ef62c3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cf1bd77b49d62734c2a3d57ab43af8
SHA15e9e9ca911b9414a8ba010c87000a1995ac93a71
SHA256a59d174e27598f853a6380583e4a9c327267407ea3e60e119aaf8bc72f8ad5ed
SHA5123c553435e1f59449b95d98dd212c603837612a71ccac87e03f6e6ce96ef219fab2297c01a1394b5409dd72acad357378e93c95c1ff6ca55795577f4e265c8acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a634faaf80941818fba112375b3e74
SHA171a9469f70c64d5fe34df2e90a2875150532763d
SHA256f32ce2787a38de0b27b9335799f95e4f6c67e4e46537b212c67fc4bdc127f4b8
SHA51215387a26bdcf1f8add4d2414415adf50085dbd4dd04769e1ab93cdf3f838aa2e49bfb2ffb573aed4ac7201aafc648674a77fb82de4acae3f28eb9330a0a5254c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa6274564b1f7f5f7a6962d74e57fec
SHA18b5d1447aef4eff54267e87db88d0e683e38fb7c
SHA256eaccc4eb128562329653a7531ef1d9dc87bb69695fef2b67404e84d5a907052d
SHA51206af2a474b2d0e672c910a944e80dc86c1f03f20ea6f5e5e830ae16ad2b74ba2e08de9c48c09fa937a7381f1f3c6175d22dcbca6fb55e619dc7992fd33b7a83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8337463b9b55682d92c30b37d6192c
SHA13af1ea47f9eebcb2d969d4fb919381f79646bc63
SHA2561a59d6dc96ae13a84bcc2f0173a99fa4fad824df443c3f57b1729505b41c7818
SHA5123a1bcfbe7aef8a252ad9d641ba6b64c746fcaebe96e3b9a5921af795c75d95db60ddc9d7382503d419e66ebfe7f6c2741fb59ba3a23c4bfa4401d531b6eb8f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59851b3b88801d09a7d2c2ad6beff012c
SHA1e936dc85a2f109f360c997824cf02de3ecf7faa2
SHA256cd223bc2422e64757bb94a4e4bdffd4e1a8de9665bb8aa221805acaa74133fd3
SHA51213dcf972b0c6e12b1fa17d162c120b7ae7140ce19d03287b8d7365197a6f04dd661d055e1edef2388830e3f4b04f98d3a036a6a593ac5356205f7be2d09b0861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcfb5816f5afc469a64f89a7769a01b6
SHA156c8d12651346014f5ebbeeb636d220f61268844
SHA2566004ef85760c2606136f33522b07d2d4533b93acdd43b7aff13d2d5279a07907
SHA5120be8baabd550a80ad8f58cb66ba6c82da12771ae7705a9a4a1e15fe20c888855f88d4a4221d6558d7c3e8e8648e2cc2e2146abb37e59453bd0aafaa4bd78dc54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c6550b1e6fb9b469821ae4f0c2927e
SHA14f7b9ac52a9219aacc14a8842157dbe6f968937e
SHA2565d784a8cf5a085cd04f6680ad22754f5e929cc5bd8ea2ae070c62ac21402f8f5
SHA51234cbf56f99f84693eac62bf257f8dd5afa3dc19ba72dfccfd96873bcf3b83ad5a699767830c987b74100894e95cdc7ca6faa8b2667e0903d99f2e44924148e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9171a8a0ce8f924688d6704679c1bba
SHA1844ef4ee52a6c19c2723a532aaa9800ded7ecc9a
SHA25673f51e938588c35e5e9a209f70e79d6336e6d8c7c7dcddcfeb797ae1e1190dc2
SHA512cf2fbfce36b5b6d78d8a33a14254b115bdf1deb8db4667cf682d6a67725d20f4fcda6bc30e2a6f65d39310fdcfdbb853c2d6f183a600eeb40dcaaa638fe41498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df81e1ac91d2849af0f801fb8a406ffc
SHA11234f150b8c602083a407cbfd6198aba9677abdf
SHA2560c3582dff0a6585a173694f2224b088626f5d5c640ed4351cb543b9953d95954
SHA512f62850e1e140ecbbcdf434c8399798d6feef93e4c113d25811124693a594f5bce05ec5fd94c8b89819e6688b2ebaecade393b0fe34bbfc78df0bd9138737d855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e46e8ec58ed48b544b818d7665fce51
SHA18688f5eebb9bd133c8895561cc9fa64850348b64
SHA2568ee77b04f4fbbde96698fac7f3a55e416f0b6c15a362db670c443124cb56643a
SHA512dd9b296b6632b0dbdef62b4443cd77c8f8ef8012c7e6ad08508520e5f2cd594bacaa2893256f247a26104446f9666a5ec278196d1030965f94e6df500e8d1ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1c75fb22a378c213d18b49c54de409
SHA135c19f60778da4da02bd6ae1546c14752da66f28
SHA2569675d6c08bed8187f375f5773cebbc3fa1dde84b301e42f6a5e83c16543f09d7
SHA512773568bbf6ff9a274072e463b4070a9522a94beebdf7883993655b535ced9a66eaa6f32d2bebfa93c248fdb5d39f85a746972da96b3bd21c2df9841974ae5be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57079fd10007badcd81aaceca62041944
SHA1434d2a40287c702db54c1684b70fe9d923f5ea28
SHA256e2f13929705a05ee5b53c93f9f29a60ba36505643f97a6f573f6b3da49114b58
SHA5129538568df03e458394ab3a513881dada9d306b9fa5d23fc02cb51dfcff0afa1986f34c9fb5aa6aeea50768a2efa276f50fbb40968ff9e49af64c6029ea4d7c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c0205c7a5c9f6845dc78ac8175e97f
SHA1a7b014985687bfe91b060e8b17764088954e2c7d
SHA2566d8ddd32d2411457886b5cac71b2bf91c25e17e1b1c6bdaa3f13575cc913022d
SHA5124060fb831a1d7527d63e9913d784ad7e6795bf7c2c184a84bf2c4fccfa2425f8c3c42d3b9f7cc0bdf500082717c954483df23b5106fed743303583f1b4b67427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d282ee82881778ae3faaca89d6a912
SHA13db1796ac77904357eeb47c93a6c91103424bedc
SHA256a795c9c7c675c2276ca4a0a03526e7a957be96c0738f46426150e1fdac5802ab
SHA512e2c86b39c95c654e9be94a36854efc594bde8974400cc75e3c1e3c85f8cb362be1a753725b6e93927efcb4b997bfd84ab13828611e67e9a81d01eb1ec380f810
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b