Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
b4f35830c802b2fb2163b3d64bcb5091_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b4f35830c802b2fb2163b3d64bcb5091_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f35830c802b2fb2163b3d64bcb5091_JaffaCakes118.html
-
Size
214KB
-
MD5
b4f35830c802b2fb2163b3d64bcb5091
-
SHA1
d12ace1e543b37d0f0b56d35b743c9cb5101f95d
-
SHA256
ca7c6ded8e8e92840c179232b056f0de0c25af78b72bbae14f1e0abebe79c891
-
SHA512
710ef5d59a89b3448a20c4f831862f602847a247394878024beaa3b26f89eabe63c432f89991e89b361c0b71c9c3d0f58d070944e25e50e9f36659de1ca368b9
-
SSDEEP
3072:prhB9CyHxX7Be7iAvtLPbAwuBNKifXTJT:Nz9VxLY7iAVLTBQJlT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82472961-AEDA-11EF-A5D6-7E6174361434} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b10e98e742db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105766" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000395499cbb4f6577f866a87da5b242fa8274610a73128c95568428c009825415e000000000e8000000002000020000000d806919ee6bede06d3a9a0410bdcc2d1999a89d56383e0b6920ec60a486e865720000000e38bb40640179121395518c44a565e0b2221ec527dbbae3bf940570b840ad65540000000259b22a1fa765ed2d603615897375ff0baa00301c6505e425e7b2af5347873409049cb5dd302d62aa3fe3403c1e43deba3b78593211583e8f68613f3cb533c58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2428 1656 iexplore.exe 28 PID 1656 wrote to memory of 2428 1656 iexplore.exe 28 PID 1656 wrote to memory of 2428 1656 iexplore.exe 28 PID 1656 wrote to memory of 2428 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f35830c802b2fb2163b3d64bcb5091_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e170307d2b6dedb99fa60f1585acdef0
SHA1cce4a87f60f924187fce82dacc5c22598f949270
SHA2560360c56b85052c96f848b8f03a1db2509160dfbd30818f27af83ac355f60f760
SHA5120a5ae7c88d7680489d8ec16bffd891c7dce89a841b6e1bd512b01af3a049b210db122006f488d5f2d8652cb13b182a22580b58dd9a5fe122d32b330f79efde9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835929d3cbee33d9f876d9364d0bc769
SHA1b477e598d70f5d21a808576da8650b7958b2586d
SHA256627ba997cbdfe7f150289fe1d1c847b259a429ba23f2557942344fee4de83739
SHA5126dce342622b5dd4f50b2366390169483b4f1cc7a9bc8caa3a665c655193c30e0219e2cfba37fb1dc87009dde3cc9f18781e5b1763bb82466293038a91b36f5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5ac60a7d4efaec44452b6ebf38615e
SHA1a8ef266b84f5e0576c3790d2b02f65b24bd9bfea
SHA25677d08cbff5270b96d9b0c5a4abc2527097c4a740cd79ea71d7c953c18fedfd44
SHA512d7a367e906a003850b7aa258c727449a792e69cb43ae591f60938662eadd23a6daffcc8dc2f1090c2e4688a60264ba6879afe64b23d943967da6ac0490f48406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ad27836c3ac77667a92797da1865e4
SHA1573d06da26478f2fb2c453ac11037596e21d91e2
SHA25699e66b9f1a857e297291e1c964527d1220f0045a88c93c1eb9021da388dd271b
SHA512f2e35dfda8984d8f2b91a36f525b9dbeab87b1c24e8a7526c063257875f3de58aa787ccaa4a50538f47882924ecc39afaddd60c7e59b80114502998a8c20ea21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661cfe0d6f213f4cd415d2c53221adea
SHA164c67ae665c641084f1ae2c590f9b374756bcb32
SHA25608012c7f90095c395c05face8956832286576280fa5a6526be567b1ca15ad315
SHA51251ab92a59c34ff398049c93b55db27ee5b6c5965cd4a4cf11685e13de9328517f466d05172a6c4ad3ce4fd2aa55f03bb29505519e8644aa7bb321530929d0c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd85d88c459553fead2c2100b490d16
SHA1fbd3bd863e5927f9e9c65a844d5fbe45f26bfbbc
SHA2561e8ba7d17541541c42a91bdd26abf5619d5198a90e65055af5d95223f0f58331
SHA5126f273063ec95e87341b2e287111ac5bcf6cc48ea440e1091e0cd124e6dbe8d49ccaf7ee2f99f7c76c2690103f5bacacd2e0c2e4edfdc27cea9a92807836b39e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f084cc31c6df8d998d759a06c11b920
SHA182724436095801eaaf19dd46d2aff5a9446d0362
SHA256c080074c978c7d3f56c3b9bd79beb5456601611df9813f21542af868892d24ce
SHA512dadd68cd80604fcd357bb4bd278bb43d78a338f6d7b42ae125050c2d4e8027d6c198aba502e4422635baedcc1999cc5446c532b62fc8159fddff1600eb4e3097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571023be45b1385d3e507706d1d7dab3c
SHA13db5c518096caf6e7c3346be5b53a3b3f47887e7
SHA256c624bb5883810efff4824204471933484e1a9540364a11c80ede67dc7b10a5b8
SHA512cf81d36b0c49e6a3b1e5f0c57f0109b108e8fa5a33dc60ed5e24fa418361b41690942adce61ae5f32a248fbef54498c817dc692b0fd074bc52a6e47fcc991bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2fdeefa1147ff25f28204a63047f6d
SHA1a93d44e4f7da5414174bde12a551d152308a019b
SHA25635ae5674c44116044999045044c4c6e5bd97bb15b9f32a97a02643aaad0c3938
SHA512c9df43fabd2b75174f1980f3c6994adfa147f3ba3c709169c70ae64e7c20194754080301de73f83578d075289afe6f38e90d96be086da31823b408a2fb25d03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578910c79acde84f6b28acfead4764dd
SHA19af33bc0f08fb7f6550cbb82061bac7c9f54ac73
SHA256399f2389f00ce8639212675734aa13c88d3303531f1a5f9408f27c59a888cee0
SHA512cf4fdcb6c971624b9b3e99c53305a31f0a920a58f224010173b9f1c33d7cbe0b235bea344122aaef801aab631d4aae4db72eaf8909df6a5adb26db026d70aea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854f1afd8d66f10ee05ed0129749c487
SHA1ac6391e6ec1eca89410d3d79066aabab2bd9088a
SHA256c1232f7c4f9c3639076e0a28ec81347c7b260b9dbf05bffba187e19d1b0dcb37
SHA5122ad3f498c9f460d6d24162d9aba1b22cea87b9208a35be540693815886cf6fb8dbb550b65f9da32bb16daf9c2d727bd8ce842028183eb138c046fede75b8dda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb01ed9512a4c987e60e8dee136db89
SHA1e41b1db0b8c0cc14684f6ce4e091d14facbd712b
SHA2560ce40c4261e58f2318862b6896e279bfe34d4a695a660a6a60ecd6efa87f07c0
SHA512f87d7cd739cd6690d199211ff54de373d2dc706b258628304d950f4a237ffc275db1c780adb85e414a09fe397f99a6dfacafb8bb3bada8a34a2993403c7b5937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc8e3a430d0fc772e7c95a4a06fdf3b
SHA126e5b74143a64b96fc263adba5c79496e5875e38
SHA2569667e4bc2a5d8859a754de3d5a07aeab17e241b36931eb829f2933a9522073d9
SHA51230f8ffce6bed4d710f5e2e520d9a5cc603415b3085d05df4698dcc7b65588a35b38d0f9ded49f5821bc6dec0ee9cf96975463bfcabea894f99c340a4ef83328d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55123b63fccece846e1632b8b3e7c7f4b
SHA1f6632a2e4b4757560145adc083c4db968de330fe
SHA2565100a9be1cee74bc1c26d6042e6aa75ba084c49459f05607fb70325976536c42
SHA5121d1b83de5168211e8cc1b29af3bcfe5e5f6b3c834e34a22f502f320e8c7903fea649a8482837c6069614e167f16743b1d3a2fbe4307f54601c6e38d342154c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543cf1c1452d403a6f7d8b2d09bf707bf
SHA19dd4e0f3264801547a787e4bb7c19d426d116d6b
SHA2568d8f06780a477d1e0abe5b5d34126f4fd9eff5a2ae7c999e835883a270982c25
SHA512b6548cb53101b8ac92528f2e13931f4c0f798ac7ee87564d1945e9c5a7e21ddbe07afeb2877506ff68639bb8aa3c7ac014c4da6080bb48b063d413e57c5f12e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c29af15e6b34cfd26787a0f3455856
SHA1171fe48a51175a926dc46816ccbf138fb9f4d6a2
SHA256b67dc8fb3dfcab7d4d684e766278a18763915f1ccdd9a4feac6b69465861283e
SHA51203815e164b5a2303048ee0d7a14ca55f098e8f7df78a274d942e59eabf22da9f81a7eb6b1563eeb10f60132762b0d13a3fedcd7909ab871911e6bc2168b623be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abe27c5cda96fc90f70198ef57ac736
SHA1975c0aace05433893f177d8e4202a56bbf19d10e
SHA256cce94bd705ccef73ffdec878de1643aa65d2f8d677eb4be32642854beb21f824
SHA512070ef57b6c4df02a84d0e5b61dd26b89cdf7e0f747bc483af557890f16b97095f477fb320638bb479e0493127863c0addc3a613092e1d43043eb558d335d5282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203a4f2258c55a4b1ff2fef89e89ac99
SHA1a783d34fc63ba413a67f30a81dd4e00e32cd2356
SHA256c79fb703c6412f26cd1c17b79da6f42fc8a194793e262ae0c6eb70b380b2da63
SHA5126a8cd57c068277a8b2b6cb6fd427aba2fa110144036e5686921d5bf37ab427369bf37ef38436019df27f3e57009db37789a9bf3497e77e1050d0465eac88b280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3b4674f0752b94249d6bbfae0f5f1a
SHA1cbb7f37de37e579fe575d1cb799291ba1fa8cbcd
SHA25676451233936a13a5e718c91e26bcd04622362c920bd6e61d94de315f1bfe477f
SHA51263c30d058635ced5115f05ff1408bbd7273d0a579884bb00cb336547866ee617fa612d8f1d20e7de40a7386f9cd98aaf7b4f62c91433949efd5f12b52c9ad9ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b