Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
a5580d7654c324b736e8c8c00652d34e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a5580d7654c324b736e8c8c00652d34e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5580d7654c324b736e8c8c00652d34e_JaffaCakes118.html
-
Size
220KB
-
MD5
a5580d7654c324b736e8c8c00652d34e
-
SHA1
a4b0ee629854158e7e4864d7453cdd38ac3d1877
-
SHA256
e138b82d8087c7d66530667c625779bfe0423d81c004406bbea608f84ad1a254
-
SHA512
8fe4e8ad03a7569cb81187ee49f5f43e9259c21dfe3ec60667be7b3cb2e9496dcdd20f2ea4c136e3fe6e7b890172a2bb54ae490dc4c3b1e5aab49f9d3c42dee8
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcP7bMHAicbXLVLHQ8DCcZqtd1rp:sFvSXLLDCP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809c744e25f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430116340" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fefbe8bc58e4ff296ba140d46cd75fdce04946ce4ca0c1e23ea72c9405a19909000000000e80000000020000200000002b2cfec8ee39fe3984d3475712cc7b0711dbcbc8528532605c7eb659c77b857a200000007703170a6c2446c52bb500e0cedcf8bff9098cd0f7061538ae600e9981c097624000000054f3b9fe10d2814d06bb8719631f33e519ebaf69516f35d153ebe09e7810087034351e57ae27feb21d1d0db0e92574ae41b797316acc711c99a99db5e2248eb0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F61A601-5D18-11EF-88C1-C26A93CEF43F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1632 2124 iexplore.exe 30 PID 2124 wrote to memory of 1632 2124 iexplore.exe 30 PID 2124 wrote to memory of 1632 2124 iexplore.exe 30 PID 2124 wrote to memory of 1632 2124 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5580d7654c324b736e8c8c00652d34e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019e16b1bb4a8740c6fd48dc7e448a6d
SHA1e8f66872557dda5ea08559d1ebf921f67a0cf73a
SHA256102f34fcb75b61bc81e4a7b45c4b846d0ce503809668ef8479a7d6f5312cdc70
SHA512feb99fa95cdfa8580e78201072d8b0b2c021815a8fc46d4d68e9b68580ad88ebaad5582fb4b3d9770a363da2343a1d5d6ba6d85f5e4b760412ac8bd1e131cacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006a12d8716ab9a03a244f71d140c084
SHA15747d763f80d06f40b77b29e9a7f5b8e9747134a
SHA25685d62dcb66f1e8125ee6acea819a67df9835deafd743a37f90cf21192165d8d7
SHA5120e584d6e232672dda801fa371c888515c31239b7c0b8893a498e3de2ddbc490e19d5b2f1d47ec1216cec7e6a98124bacb56d83fdba6015c747d437c3b388b7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502648b65cd12264a6fcc30639c6b8d99
SHA1a8dc0ac28dda99338f88a72855ca7d2be8617cf5
SHA256534e3d94bb06965dec5bb7ecb73bf54c68cf4c3740955a362607b6d94a9c3654
SHA512c2399dd62d190d454b673079bb97d2110f5ef7b33764eaa4695942fa78cccc803864a9173c5672edb2e506425de09b967497ee41ce9d16b7bec4c9079432b2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7feb5e6791348f723e1257bf21c4f7
SHA156ec07c9d59900c8d804a4c708a1707e5873acb9
SHA256768aa2f5e62f7c869024b4ebab1a5bd0e0e734e8ce7ea5ab0e9d40d3a6bdf718
SHA512fc39802a4a471ca655dbec5577bd850ef279cdce33735ffdee675727cb8c6a40163980adb02d0aef3fa9e33adf4230a51b22b6d43bed89e45639d1eaf79c1809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d16ade200d01115f64eeba01e4cb7a8
SHA1359605e1a6d5748a0402fdb0a0c7d383b489d101
SHA2560775249c6f13f78e4ba24d3cc0e5a07195c76115ec31b1c607021698748cca3d
SHA512c019340d5cbac2c91e955c9d1bae69f0b5d5f50247147ed14b14d4187533b160b722c65bef528880dcd7b06d6b9d93f71f65ca28ef1053e70e1edca79d21cd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53494a5504cac0253b0ba7148f8b5f30a
SHA1236d68ed6683fbc1cde0b574952657c5a88c974c
SHA25628c540ceefa7eac2c4211d9144a34f9e25b7f95cea3e05acb8788d5f0eb1de71
SHA512bbc99f0bbea47cedacf07ea38db66b3130442d2e1aa2b00b9c0c665746dc0bc1ead73a9ba03f0e1afacffdc6d923d92e783dd975217e2a54eac7a249b022dedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2f19f7c87bd3da878dd8ece4de3b91
SHA121e549419003f8cd6be25a58a1de44664f7019e4
SHA256056374c0d817992f58745da379865cbe7be542d17c7c7c066405489ed4650c60
SHA51260cffdb3447c37f5ea8b16f282422a01a74ffa2b34c1647028ea8d06a93428716b5d8efdd65f7f709c0ecd8ccc83234efd0ce649da803e8b1dc38ca19ad87fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ae49fb9ad51a5fdf93a172db341da9
SHA13376886f62f0d51a455dc37017bf6f090d11cb74
SHA256e02d786a723870511147c14aafeb21e3e7f6a7039408fe6d3db59bb82a35cbcc
SHA512e1392912b37465157f5d4d3d4efddcf82370a8c80cb0dd797581bb4310bff2ee31900ae5dfe407f1ea430ff991d705cedcff8d353b8d6b95c967b3b12acf5ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c498355ed6010a4e57380c14990de80b
SHA1cb0f0c03ab8e857ba0d1a2979d9fee0c762b11ed
SHA2569bc1f28cafc1dd71ed9f3e1d08b67ee1793f1552a583eeea4a7f3af7a1ef76d4
SHA512697b3bbc7a4e60c374549ccf30938a7c5cbbb0c683afe5f15cc5331751b96fbe8b9c7708966afb2c836ec6625bd7d27dce3ec908acd89cc5aa975f322852a73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57685e738d252a5a25c50c79a57ab4ecc
SHA1970f5c0b6a269c2cbfd5ecc94b95ecab2713ec28
SHA256afecb0102c3ee08693ba008ee0ae33f63818fbc142a91e41741d56d855d83884
SHA512e5768d38aece5cbfd6dae28ab0e07e887c5842477fae85702cdf1bf7a9ff6ae347ef7866d13af2019c3184552cb1fb515c9b263d8ec08fb39dd1412c98f62ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85da3b7b7360df772fe29f39d1a3d64
SHA1b08040ebf5f86697c60eef80af0b93e81f0d7989
SHA256c18d4680db4a49004f7a3047d66b30f32959458a25183dba480b01e13d7ba7b9
SHA5129bc63bc939f295f5d956be26147a29f5a2fa5264559c8f452179667a8bdcce23c34ee6b46c57c1bfb065949cec7ede45a27561228123cae7cbd1d1f9e8e166ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea6aff04b455089d7e2ba72c90d1c7d
SHA15655b03ef99bb6423a4e2da1e9ab15acae0ad392
SHA25629ef85003519945beba475e689ba8a75be0c2d63288711cec6476cdf46447722
SHA512aa01d1853071bc011eddbfd2ecf5f923c1872c5b0859b9f99142007cb465679d2e16dfc4b9cd5d4451b7543c68f6e577eafc0c13d60fa8b199e240d5dd8b195c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbd6749b6f6176ba26fec0dcc87a9ca
SHA102bba39e97e3f303623a8241a73852278be2adce
SHA2569bbb7992f2f28846c051f8f751f586ded43d1050a3956d7ec0369369a5ec4438
SHA5120786bebed36384c0543f9ab65c56612f56553687c5fdab62d5983b937f6ec060c64634d7a06e1caa83c476435fa536e76ae511dbbc45868670502605cdd57c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531677de3ebe93eff99b7590b27c2594f
SHA19e04e2b85e1d9db60e66f899229622cda79e3fb0
SHA256e9ce7d3e93ba9e29fd3d3bcdf83d65fe3a6c3d537df774d8bac0332e344c3ca2
SHA512fd5f79a165fe72562b102d864a849ea6d857b057b9765c5da75a61c03e821c71c3fa3cc586ced95acd159412d5ea6bf91857fc6735e9baeb8985e79c30b24717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576262acc9b36be2c063caf355dbae479
SHA1b9c8e84b1bf64d0cc23b7867405e382a9c2d8cef
SHA256025a5b230c712f87fad7b398af55ef2c8f1866b5fcb8573323525f5990840362
SHA512dbad8ce5ddb2e2b053e6e7872c023c319c8007f735a1493835593442f9f06a056eeaf427997d676820e5ab2ce58190fc5b144973a0c9b88083c90d0647d2787b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c445fd95df9fcec016b6b10bd81cc8
SHA17083a14964a9877f268c103ee0b7402f08e08fdc
SHA25608d4472fe989f706868115f4772950b550dafc60ac83a9139dc5cf7bcd0d0c20
SHA512f849b7dc7e40d679e01198f04b882f214172392bbca2ca7533f5d2585022aaad9bcd8b1f77edb24803fc48473dfdbc1e77b0c49a2ff587cbe0f7b01153d3b7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7da3a9b3aa4aa07ec8d44537e1e6524
SHA183c31f7138654f9be7e406bca4e8d8c179825010
SHA256d7e690064866ce03512043e6ea4e82820a0a068d38d42d528519241e1f6e27c0
SHA5125dd30e6647c5532b1aac77992a0359168586d4a964c683798ca8617574a48b96983d4718b0dcce967186e2ed9e20a1d9005ac6ce146f47c6bc47a337e6e70e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb37a9d34be13e9a84d7bf6820cf1c8
SHA182ab2d89e9ecdd8a3ab2fe9ea369ca79e1302127
SHA2567fdf5d8a8b60c0582e611b10439ebbdc5609f41d637bb445f97670added690d7
SHA512534eaa7acb8c1967cf7bbec30f40c8c0840d7ad3c42fc498dec0d81f8b4aa88c4310e2179b3e50c762f971d510a12ccf863348f4e2590463e4829b12629440aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba21685bcebf67d4536046279ccd372
SHA1bd23f22afcad986f78c2dfe374af3c496c2451dd
SHA2561e8a89c6bb775cde18c06d9b7d3aefa656df16049f9760cb67e2c2d9ac251a66
SHA5129e96a5f1199c3d13381e0640ab0692583276957db7933ab5e8f25e1dce8b837c3853772eff4fd8fb903ca9d0357990e100a83dc5f744d1f30d21c6fe62008336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a313d10e62f7bb1bce25a28bf54963c
SHA1eae825d78913bdff69bcd250a18f12cc198a54be
SHA25651e7c7a7f88bc62dbd751c080be26af87ecabedcc5e3327124dea6011fbd3117
SHA5129307389be908571ce076a2260227bd599deef75145c3cf66b0867082f3d0111227ad4a234898f977df8b4ebd84481deb3cd38cbf5ffdc90a60062f25696bef7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b