Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
fc97fcfbf22ec39c017fa2c627bfcfb7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc97fcfbf22ec39c017fa2c627bfcfb7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc97fcfbf22ec39c017fa2c627bfcfb7_JaffaCakes118.html
-
Size
135KB
-
MD5
fc97fcfbf22ec39c017fa2c627bfcfb7
-
SHA1
f2772bc0bc5770fdf6adf13f91563f837aa21c4b
-
SHA256
3f3924c15ca4446b4a96285cce54d1c984180d67c0071c929689ced3ffe37af9
-
SHA512
8bc661de618f82012b8dfbef16a65109bff25d82703e47194789290c6b762a179e620bdbbaba486e22fd60f8fac0b1ef8795d79112ca5d69a105d2f2e7bd6498
-
SSDEEP
3072:S4dIH8Kq4kaSPGrKLJDadI/NCttyfkMY+BES09JXAnyrZalI+YQ:Sr4sMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7008ca27bb11db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000edca89107b6b7d01efcf3f7643bc94da3b818cceca253dec6fca165305d8a1ff000000000e8000000002000020000000f6a9e06566f02456061cb12abb3b4b262b19dd715555cc21c9d727ffbe16d2ab20000000b8ed2e8759ebd2ef7012b6a0aaf7c188e77bd3c0d2008ebd94f76156678789af40000000b218659b8b3ab35f6e49a4cb91e17ca513e30fe3fec262417dd42c0d87c78acfbcb772ea6728a11ac0e7193f563f0a8dfd8aac5a7fa8fd0c8b42348e9a920ed8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3962ABA1-7DAE-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433699139" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 3012 2764 iexplore.exe 30 PID 2764 wrote to memory of 3012 2764 iexplore.exe 30 PID 2764 wrote to memory of 3012 2764 iexplore.exe 30 PID 2764 wrote to memory of 3012 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc97fcfbf22ec39c017fa2c627bfcfb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f643111b15a6b5faf1106bd5cbb835a
SHA1aa503de61f66fd748936cd8e2d6a33fbf836fd5b
SHA256574471bde3b27a92d22f46bb86e5c56911e225dd142a1f3699cf0c1e1539e460
SHA5125969b654f9269afd202d40dc64b7391fcdba38b79a59bda91406dfbbc6a5606ba204988d592b2b93c97a642a3f9bec30b6850303bffdd6a81df86327b63bfff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514781245b3aeed133b23f4c4dad726e6
SHA1a3e03dc45f032ce2f408bc744cc2ff438e1eb394
SHA256e39c8a5a1dcb86febec67a33a8e28ba20f588f03d25b43d7cf46bef4ba7225a6
SHA5128b652ec5033e46b71796534744958e7b45a3459298d3181f9159ab2445acfab7a4aa1b572d46fd461711a394d926759cda4c1633bb44db838decd25fd7ed46f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc84a4b1732d8b52ce3cc8985bbb610c
SHA195bdafa6d8dabd9ae4d79fcf14e0feaac613fa35
SHA25625fed16a093befebe476b9e83bb2cd66af2b58fe8700dbfb40c2aac6312484a0
SHA512b8a961d4bf458ded830b75644c5ed91db8182f572594c1afc93ff4ebda9f25b492e4512a7502a036b72e0234db036455f637c9e205522c97299c82f2b1546ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf13b88d8bab088341cde5ddfef7dc5
SHA169332b8a51d1b59c0f56f15eee676dbdd188bdda
SHA256d78e1b8717aab900ff1519a07aa28ae814a421ba97eff60584470d0172f25b4d
SHA51240c25c5ad511e02a1bc5361907a4e4ecb3615d125b7c11315f87539b93a3ae34055b2b215f5cd811e950be2107c0c5efb462c05231cb0a84a09558ecc253c2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ec74d16d586459ab70628f4aaa65e2
SHA188bfcfd59942f3b0f2e79517f6928531d4d4649c
SHA256daf2f537a2242f244484e8d941f7d738f776518a83a8e6171799259e51bdbbf9
SHA512574dcd5262353185c58faac2ad125a761757f7ea94dfa7e3ad0791514362ced1951baa8af84354f392dff469b8243670de57a59dff025c34a20fa9415b118551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a57871d9952d132952a61b2f954a248
SHA18a412b6c846e62db72ae873ef9f0c8303d47f131
SHA256d0a98dd181de23ebd970dff7dac8332b8431d61e0eaf34183c5cc52874eaa521
SHA5129c507267be1ef7c9fabdde839dfe4ab7782c5e5faf7c1bbe3204f51d559f489be320c4dc4a4d1d2854a11a613ba13c7e530c64a91418274be215a4a52e0e7a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50376c471663de3fda81ef6f5df1caca8
SHA157024b2f831e3dac5d0d7987bdb0b1e3ef119a17
SHA256efd80b78db7e07c46d05e1638c39bbf30da72a026a71937a016d241fc35b3293
SHA51283799a86cab8171a3f59e4b0c1ac8fdffcb6a094501d11149d3318cfdc58af2684ca45dbe3944d5402378f029715145d1c1d684dcf350a6a12bed6f5c6ac4387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d433f0b692e418379208e082c7347462
SHA13d8c72a0c6d391aff6de3264c276eff323219fc9
SHA25656a9dd3b35eef574988b3b46a9bc427e469d4a51d8d1aa2ac83737f9203674aa
SHA5128f70fa9218575f98d8aeba96fec223af39593e771acdbce6e9c42a87a2d60980589c697b19af05c0fa773859b7a5fc71d198dfb11a76539c6b44e115a08b6daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767ecfbfb0fc46af97b28c2d7e7b6cf9
SHA16546af8ab478c3272529408187d36cf150e9ac1c
SHA25687c060da021910bbd59f5547891de850ec12665ff6033f5b3fc0cba0c37e9785
SHA512b179bcbba45afdf64d95cb67578943cc0a024c5fae3302efe6ab1051040ff5f506fe9eac5a35647f6ef481a04ff2d194c286aa0a790f79a4a957025ed83afb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c0c4be81872afb64b54b3a3cbee077
SHA1db5b23d051f768b22e94b75b1c913c58399d32c4
SHA256e53b26f93e47038753dc8433331a1b79455c5ec9e901269a8c25a245ebf89f8d
SHA51239935c2251e0eb10d9c52d3008e89e8fcf42d0c794ff03695124dfa40db4451020b623d91388a9984668556f6940c8baec47aeae0dcb306cd8391a7553a74b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445b1876b91ef87b6977214f660df2c7
SHA1d363e8f096b5f30850e66f07c63943b4b70045c6
SHA256796011d6ad7772b57dc3db933718c26cf0cfee1cef05d9be146ddecfae96f205
SHA512e5c824bf99b1f8c2dd411f608ec218c358d9f85020aefca61595ec2b0d277cb5656c5e99d67ac2248c25a6d1607fb046b343b1676159f8382d464accc96d4004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27da809b82897eef517ddec4d5cb09e
SHA1f63057ecf460556f4efe052f2da756bf8ea69ced
SHA256a1353f0a9b7830fdd980c56020dd082fbe15bd27688a943c959ef24c9d4cbea1
SHA512b2ba0360e08a11cac70d82d3e909bbd33bf2bc8738a53c96de60f190a02de7284c190ec95a2a46b32f2857ec5781725a490c44e0053c90df0ea4201faef9c95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59877268ee7d59d7fd9b6fd2672c28bb6
SHA14a9691a858ba42dfff8c8dca5795194baef4e94b
SHA2566cb48bd64d9dd51a98d35953fd5396894b1b99ad026bd884d987fd1a12502c7c
SHA512fe68359e2ab076f39c6171f7d62971909f04f6f19fbdb44176262189f6c33edcbccd773d5a008d28bc991bc3f34756ee9bc774f484e5cad2875ff00db0e70611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e68e179940809fa22b1248381407748
SHA193c81934afb0ede8880356cfa5aec91fe9910cd4
SHA2567ac7b96e174e8ba71febda0ecc0bb426476befa9ac41c0d0bb52a5fc306e28e0
SHA512786bec5eba45c29aef10540f307bf54fc7ae581e7ec69aa82a420626a9ba2dd3fc07bd6d0246401429a0a2ed70ea8246b234072d54dbef08d313149a130d5e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c0dff3574e8992f75620c74da81cb1
SHA1fc3d87e547801d9627ef33d87ef567faac7dec8a
SHA2561be1c98755f7c15e3c107de49745f3e2b3893ebdc5c46c88ba8f54aaae74a76b
SHA512916256ccf1d128053f553d07037039262e81f9952e149d3c54b18d4c0bbd252d907cba86e07e39ab44c641d5492c0c0e91426d31085cef602a4e4c94e5530527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3938d90e0476e85294e7947a8dfd5e
SHA114887b579879f80b4b290d8bd166d4cca78d1d14
SHA256984b38a71bfa6ee7a095dfff872f9d501c7988d76f71b85d1d63a93020c60603
SHA512d3abd3a48846bfa561695e9c6567bd2e8d830284b55f572e560cc24ab6cedb34d1acc7c0cbf6a30e16acd8c697032225ffbc3204c71e1a9a45de8f993d8ed592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e7d46ab5a49deedecac1dc15dedbb6
SHA14ae92e2033ee8dae2f4b37b627b966297b7dbf91
SHA256e556dbbe3fbf80f85ad859898acd3958b737183e121199086204a87a5bf86c7e
SHA51200450f6f1b508475dbf7f1c9deaa1cf9f32a93229701bc73af0f3127b126a3cb2c6514bfa55af1572e63abd5249d52a4f90af12b3ca32bf2a78bcb8fa0c6161f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52817da0c1de35626c3e1e953d4c2427f
SHA119db7328c7ed30c95e855c95ff8998f03383ecfe
SHA256d190a28363e11d835d845a0d5646535c2afa4741e7701114b17bfb83b8c14855
SHA51277d8a34d130ceac4d6bdd35a5200f3e662c792f2b7d900cd69b1b6452eb04047e22b5f6acf200bcf9678d54055622c4eb32dbdd622f999637fec509e4902f719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535766e2736c33bec438115407c01f047
SHA1375b4986fad735d9cad84b7fe13afe88ea1ff648
SHA256f2a0ffef1cd91c85cbb31d10c1309b1569a8e2b2883e8d97ccf811d61328f7e3
SHA512201eef0d9cb6b11832a10d0a7d98fc9f905bc99348c68de32030086b33b21567bc79deaa6706bcb95e2fb1057a21163b4afb09e89be986aab610482487563b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a9f8d28ef0f7aff8312dc7a6015be2
SHA1e9e6063bd280aeaf4707996e47c18849df842fa5
SHA25652f12896c454eb903e34d6dbca65769259285323bd5df4990b682831e4a97db4
SHA5122da19f3f19bc2bf1903e1a3a32ad52b10492379b3bf8e88eda3d672c557264f123572c384217749a0fa86b9264de24b2e2b09f865c40e7be95074cf54d4c8b83
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b