Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
94ff0f1d572c52f14c83d32095b6b772_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94ff0f1d572c52f14c83d32095b6b772_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
94ff0f1d572c52f14c83d32095b6b772_JaffaCakes118.html
-
Size
53KB
-
MD5
94ff0f1d572c52f14c83d32095b6b772
-
SHA1
964224e72f6f8dd392876953c13a8e138547e9bb
-
SHA256
460da49aa74387e05036af3f3823206eb3a93cd130f91b4c3e261902acffda38
-
SHA512
b2640db0009a0f8fe012ff46a07c189385d4eefbcb693a8c521426f4059a28d6430f2257a36f7cdb744e31ee8165260cc18838a8efb2fb14a9fb776854e3156f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUPrunlYt63Nj+q5VyvR0w2AzTICbbRoW/t9M/dNwIUTDmD8:CkgUiIakTqGivi+PyUPrunlYt63Nj+q+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000003bd4b08e00f2a63f1ea9ed5e8be6d0b4001b5a5f48bb199fb50b0b5be672310000000000e8000000002000020000000d1c52e6042a74986523bab74f419022779132d32aae0c8fffd4c5fd4923c2171200000001b5f2e5c620e3453dec6ef645b4383f1d139185ec8e57ecee93666aa240b3567400000005ab55f4cfaafacec087cbe9d5b896ced9a8146552daab32a91bbae5f3579ad689cc441ea228e682e63b7407f640031d8d21aea7d935c926bc6b9e9fb151a3e87 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9443BA01-59C3-11EF-83F9-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30311c6fd0edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429750069" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2392 1956 iexplore.exe 30 PID 1956 wrote to memory of 2392 1956 iexplore.exe 30 PID 1956 wrote to memory of 2392 1956 iexplore.exe 30 PID 1956 wrote to memory of 2392 1956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94ff0f1d572c52f14c83d32095b6b772_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52013dfed090fcdd5ce3cccea9cc7514e
SHA117c1ec6c55f71dcefbf456a1556f98dd57524492
SHA2569e8e1f9b5ce21942a48ba4649a22d7f2a9b18ab707826e57d49f26a11813788e
SHA5125cce9cb63aff8418f76544da249e91702c6b0691e871f239d85902731957287b11e2e699d55c8e3161ce14a8d28f9c777ff099a6ff8e59d7111a14b13d519ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9acd093b961699134ab0331b22870c6
SHA181d92bad9d35ab3111072916b789f8c20f469c93
SHA256cc35d6f4e3df59c5a5ef5d105e4330390e25f3f5c3544a9a62cd5fd318b00806
SHA512ffe8eac2376b9fe9aafb5a37cd5d25a1adb0bd0c610a5aadf87a709c494002771643e46f1a5277e6cbdfcdbd4a8ed08f1d321e2bd9f265645205045b88da855b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54890f133744095b543e305b50ff99f23
SHA13f000c98804abaf7d60b5932093b4448492c5dfb
SHA256bdd768ca2192659ab4400bf958af3adb96a59f9baa0bdc98cba711baee742ab3
SHA5120c153c15e837a51cba19a1e93766a6839d4245b454e408b8c214370c624b12aa5e98a271678190513408046684c9a66a1a8b2ada8a52c8893dbcdebe429bbcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2c3daafd42efdd52b2390eadd71cb7
SHA15f07177662a6c88578006de75851a6b96e491373
SHA2567b15179eb89d2508366c1d33675534ed9beeaa6075f1dad77f3d66cf9726c62d
SHA51295a075e0b95abcac65b2dc0f3fcdebe0fdaf43aecd33109b06fb65c9e9e798a2e2e37a429e3f76d629d5d310dab963ffe1bb14b097e3f7abffdfc9634c6766b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ae93c98d1fcaa7f2e84740f66e85fb
SHA1d6ba8735d1b88193561f728a8293908b0d2915c8
SHA256c1366352b75dd12ce8c4aefec93473e7ece98b1808f212f0c5577f2566173083
SHA512d38ff57aed72ce55ab303bd9f4b6faf1e08faa30b35458255957605ce86760bfc348ec693050f1b86f97b59f9933325966fa29834f42c543c0f13f354e714541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851d9f37cf5f727f3c1b7c6b993536e8
SHA1cfd03f251d923c976002e609438e08e42d56f7e5
SHA2566652a2c4ef1d2b7a67f7d6b3ba39278974e127881bf41585708961116dce89bb
SHA51299c082345b566e2e3a88f56e90c6337561f3e07823d8ddf2344e9c5ece9edcaebabf02b9a3631b7092d42a922db0a23ae5910a00fbbfdf5138356197adafb43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570e898ced0c1df06ab65fdc53b784196
SHA123745bc6c9de0ce8d00f510765f331529c113c8f
SHA2568d8f5e1b0b290fbd1a8099631299eed47b31d68010c0ab8b1509f7c1ea09a924
SHA51217e19dccfbd0fed10da3a0d11f5248bc0baa2c395b94132f4fa5b55fcb5e995a5d1b88f21e814baaad4082b58e89f6d242c10039dc225a2c6fa37fb7fcd95743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547643c322ab73b25d0ba521a7c58cc98
SHA109f868e072e0c7aa26bae77164eea1ca5708c95e
SHA256f16847a4a9fed2b6287b83ad1c089e99a60e39f061610bfa47c4bf9a450de80a
SHA5126d0fce664fb714ae10ea871cd268279e4c5dfd2265a443e4e9b0a7a2888b0a1f14ccfb685c62834dd7eaf8c352c40211ea6f6494381e22a438304694f73ec73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92fe049997c267c1e73065fbc0c2ac9
SHA15da6fd7dca45d06ec3b308367bc65aeebf57955c
SHA2563450c89dd3b12f0b329a5237506802c9afc245d63eed7abe0ca776023715c32b
SHA512d829e2232ef307841cfc1481c920cdd9b44212eca793473d80596ad6ddc318bc23f54a02d9e97788d483e10b7d63e6d7eef3edc1c1a08b00135c11697ea7ba2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d6e9de60e48a416aa6a7d09fab7385
SHA13254ef20be0104561bc968471e47c004fa37481a
SHA256917784b8f885f3de65fef597bac619f3a1c3d8cc0b6c2e1b39268b5d49a8139b
SHA512a610a4ae60d33c1bd779dfd7281b86afea9afb518d2088b5d82f573ac04f04321ef93e84a1422991fdcdbd6725e42357a3b4f6425587f9530c3acf033502fe4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b30427d3376ec54ccfc99424da9f0b
SHA1c974a4e7e5a69a4c445b99d84ccab958d5bd44d4
SHA256c1cead29d80e1b37432093b502943ea921ec01b32eb9c7299a2a0c02992edd38
SHA5127e5f0a0571e4f0d5d4820c3dd9661f7a8d3a41f3c280d4f0fec335e5af8dd58bfcf7c6a1a72ea14792790f649cc8580561656305d2b2975e07b05d9ec1eeaa1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574139fd6d536e803e5f1b7b3d1ee21f7
SHA11a5f6709595e56948221b62f628acf5b03446bf2
SHA256c1b82bf60c6d5e26fe5a8dfc5604f9e13cfcb1d1d437c42a241c091e46e5b4f3
SHA512f5dba14e99a25175d50a2608f06c73d20ed4503ab34dfeaac8b60cc352d9cca0dd12ff9d4e72451d4bea920bd8afc738b35010956f5ba28d318aca72b2d99f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb3b21b56e8cf09d14f36eec6a0a6a7
SHA18bdddf6998a19de2aea2d6d18863fb968bdd978a
SHA25645070d3eb434130d8ac0542bc1f52c45b0ae909dbaa9a3a824bc64c5d06247f9
SHA5127ef1046528b07d1943db5c2295591301f20fed846684a5af25aead5c71ae589a43ff96d1c9fdb6eda7bfae5089bb26bcfd17ab7dc44a3f8de2a8550c75771a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d8e643abc91d6feaefc47a319052ff
SHA1565ac600276f264e61822649a96fa4eb7b4ead84
SHA25684181588c44ee8326d63b8d31955d70f36d138beec8426d57ba9561ca06fc9b4
SHA512dfb1f224b4fdaabe00e651d58abb2fda3ef21de6b68a459880b7fbb20269a81c30be5d83f75803e4a852c0df5c39e71f62a38ea108fa4be0e1fc6b4f0cf30400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc0d82599613e92fab757767b31544f
SHA1adf22194fc0dced106f0885582453b45a33bc331
SHA2564e81cedac8111f24b8473423fc13788386b79308e5e32648db2fe77c01967983
SHA51280bd63f49ad73f001e419c5648103d749156f2890df2df2a3257557d7880fcf14babc59a43058ac5a96931ee77eec17e5076a1823d1b51b6074378e6201e396e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fdba78fd84e7fac32c0324083107632
SHA1a31794d5a7c07db43c8e2d46aedf4b462c712e4a
SHA256be06406bc6726bda371cdeb50493ca3264b77369f2a5db7ab1097a211c4b09db
SHA51273360a98a81b052c980adb8fec50ef3aac9b7d49a315e3c22f729a19118f8679a28a5dc30eece876d0f1a75d5a26f6b25b6dd00b6fe13e3cc8f8da41b5bb96f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0479259ca78592c8b0913558676cac4
SHA176e8a3283554942ee2061eed8fc5054d66612b66
SHA256ad9f64ae377f77f058f56cc8ebef750d6a9231569eab30b0714ff0cd0d2b2065
SHA51237bb390daab4c376c48a09c77f625af39bd20a16a73821b9b5f47e798977979b34851fef3d2062a292aed3185dd5f1b55251cb6c7d4299b34d66e199733f8ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59145d751e1439d3acecccdbc072a4266
SHA1c6377da982a962a14dadc46f683b6727bc9d86e1
SHA256d85f9ff2beb7ede300913c0bc963be3e04146b1909b5429e209ee67b700d2d10
SHA5128416d51e2501a5caf94c55d8cbcec91bc26851c12c5de27a1ac2bbad048cb15be2996195781d60ac3c666f72b9ed61a4e0ff42f08f6d10ff269cbff4ed979652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a045a53c493ccdd0d44d3a8359d67c19
SHA1f7a6f160f15b7d25f7c1a8a3bd8180a8f1e4ba2b
SHA256124ba07ca237b458155bc1896cfbbe05d20252bbc0794874d778d84bfbaf438c
SHA512fa2f5a42707f0d135b2b7239099fc36165ddbecc6fc07b45365609fd99f858c621bdb088b8b7a635014bc836f37dedfb337fff21521991a622697a3cb2e4bbc6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b