Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2022 18:25
Static task
static1
Behavioral task
behavioral1
Sample
0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe
Resource
win10v2004-20220812-en
General
-
Target
0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe
-
Size
130KB
-
MD5
2ae08b2b339f8593d743991cce0c747c
-
SHA1
d99acc1fc5702475f27c729be631fb0c4d2f1625
-
SHA256
0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a
-
SHA512
bc6c43377168db0d06a682e4f99187bd06f16b1da058e37090ae902ed8dd87fa68578fa17cf3cf9b223b91c5c648e8b3e492030f026a6253aa28efaaf16633f2
-
SSDEEP
3072:YKiT13Tc5d/Lb4dc+oytXrlvfYa1f+Mxn5B:E1E/vD+Z2aJ+Mx
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @mr_golds)
77.73.134.27:7161
-
auth_value
4b2de03af6b6ac513ac597c2e6c1ad51
Extracted
redline
install1part
185.224.133.182:16382
-
auth_value
01759eb8d6120155c19b779c527fb1e2
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3760-133-0x00000000006B0000-0x00000000006B9000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/102488-141-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/102408-180-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
E302.exeF022.exeF98A.exe199.exepid process 4524 E302.exe 102540 F022.exe 102608 F98A.exe 102748 199.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
E302.exe199.exedescription pid process target process PID 4524 set thread context of 102488 4524 E302.exe AppLaunch.exe PID 102748 set thread context of 102408 102748 199.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exepid process 3760 0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe 3760 0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2576 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exepid process 3760 0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
F022.exeAppLaunch.exedescription pid process Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeDebugPrivilege 102540 F022.exe Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeDebugPrivilege 102488 AppLaunch.exe Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
E302.exe199.exedescription pid process target process PID 2576 wrote to memory of 4524 2576 E302.exe PID 2576 wrote to memory of 4524 2576 E302.exe PID 2576 wrote to memory of 4524 2576 E302.exe PID 4524 wrote to memory of 102488 4524 E302.exe AppLaunch.exe PID 4524 wrote to memory of 102488 4524 E302.exe AppLaunch.exe PID 4524 wrote to memory of 102488 4524 E302.exe AppLaunch.exe PID 4524 wrote to memory of 102488 4524 E302.exe AppLaunch.exe PID 4524 wrote to memory of 102488 4524 E302.exe AppLaunch.exe PID 2576 wrote to memory of 102540 2576 F022.exe PID 2576 wrote to memory of 102540 2576 F022.exe PID 2576 wrote to memory of 102540 2576 F022.exe PID 2576 wrote to memory of 102608 2576 F98A.exe PID 2576 wrote to memory of 102608 2576 F98A.exe PID 2576 wrote to memory of 102608 2576 F98A.exe PID 2576 wrote to memory of 102748 2576 199.exe PID 2576 wrote to memory of 102748 2576 199.exe PID 2576 wrote to memory of 102748 2576 199.exe PID 2576 wrote to memory of 102804 2576 explorer.exe PID 2576 wrote to memory of 102804 2576 explorer.exe PID 2576 wrote to memory of 102804 2576 explorer.exe PID 2576 wrote to memory of 102804 2576 explorer.exe PID 2576 wrote to memory of 46656 2576 explorer.exe PID 2576 wrote to memory of 46656 2576 explorer.exe PID 2576 wrote to memory of 46656 2576 explorer.exe PID 2576 wrote to memory of 76056 2576 explorer.exe PID 2576 wrote to memory of 76056 2576 explorer.exe PID 2576 wrote to memory of 76056 2576 explorer.exe PID 2576 wrote to memory of 76056 2576 explorer.exe PID 102748 wrote to memory of 102408 102748 199.exe AppLaunch.exe PID 102748 wrote to memory of 102408 102748 199.exe AppLaunch.exe PID 102748 wrote to memory of 102408 102748 199.exe AppLaunch.exe PID 102748 wrote to memory of 102408 102748 199.exe AppLaunch.exe PID 102748 wrote to memory of 102408 102748 199.exe AppLaunch.exe PID 2576 wrote to memory of 102452 2576 explorer.exe PID 2576 wrote to memory of 102452 2576 explorer.exe PID 2576 wrote to memory of 102452 2576 explorer.exe PID 2576 wrote to memory of 102484 2576 explorer.exe PID 2576 wrote to memory of 102484 2576 explorer.exe PID 2576 wrote to memory of 102484 2576 explorer.exe PID 2576 wrote to memory of 102484 2576 explorer.exe PID 2576 wrote to memory of 102592 2576 explorer.exe PID 2576 wrote to memory of 102592 2576 explorer.exe PID 2576 wrote to memory of 102592 2576 explorer.exe PID 2576 wrote to memory of 102592 2576 explorer.exe PID 2576 wrote to memory of 102612 2576 explorer.exe PID 2576 wrote to memory of 102612 2576 explorer.exe PID 2576 wrote to memory of 102612 2576 explorer.exe PID 2576 wrote to memory of 102612 2576 explorer.exe PID 2576 wrote to memory of 102668 2576 explorer.exe PID 2576 wrote to memory of 102668 2576 explorer.exe PID 2576 wrote to memory of 102668 2576 explorer.exe PID 2576 wrote to memory of 102740 2576 explorer.exe PID 2576 wrote to memory of 102740 2576 explorer.exe PID 2576 wrote to memory of 102740 2576 explorer.exe PID 2576 wrote to memory of 102740 2576 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe"C:\Users\Admin\AppData\Local\Temp\0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E302.exeC:\Users\Admin\AppData\Local\Temp\E302.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\F022.exeC:\Users\Admin\AppData\Local\Temp\F022.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\F98A.exeC:\Users\Admin\AppData\Local\Temp\F98A.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\199.exeC:\Users\Admin\AppData\Local\Temp\199.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\199.exeFilesize
2.6MB
MD5529174498fbbf1c72fb39af656d5f98f
SHA1439edbff12742da9e15da5ab4a2710f97f947a50
SHA2569e4bb9e9b4a0bd622deb940906c082b65d299d3c768b4957c1a89a8f60572f28
SHA512ad760ef8d26f645736a05d076baf98731ce99f3d8dd13f7828a09ade228c3da0ddefe50c7a8e9bc5b53488986c86aa708cbc1717e8ad1636e59b3f0f91141abe
-
C:\Users\Admin\AppData\Local\Temp\199.exeFilesize
2.6MB
MD5529174498fbbf1c72fb39af656d5f98f
SHA1439edbff12742da9e15da5ab4a2710f97f947a50
SHA2569e4bb9e9b4a0bd622deb940906c082b65d299d3c768b4957c1a89a8f60572f28
SHA512ad760ef8d26f645736a05d076baf98731ce99f3d8dd13f7828a09ade228c3da0ddefe50c7a8e9bc5b53488986c86aa708cbc1717e8ad1636e59b3f0f91141abe
-
C:\Users\Admin\AppData\Local\Temp\E302.exeFilesize
2.6MB
MD5caa086e140d4ffbc78a1a4c91869a973
SHA18d5b4f00412169130ffba2167e502601b007b526
SHA256bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8
SHA512f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2
-
C:\Users\Admin\AppData\Local\Temp\E302.exeFilesize
2.6MB
MD5caa086e140d4ffbc78a1a4c91869a973
SHA18d5b4f00412169130ffba2167e502601b007b526
SHA256bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8
SHA512f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2
-
C:\Users\Admin\AppData\Local\Temp\F022.exeFilesize
255KB
MD507ea3bc2b9eaacd002de4f59803ef234
SHA18a796069e5eac844f40b4487c80ed1c93316a331
SHA2562302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1
SHA512d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092
-
C:\Users\Admin\AppData\Local\Temp\F022.exeFilesize
255KB
MD507ea3bc2b9eaacd002de4f59803ef234
SHA18a796069e5eac844f40b4487c80ed1c93316a331
SHA2562302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1
SHA512d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092
-
C:\Users\Admin\AppData\Local\Temp\F98A.exeFilesize
337KB
MD525e6c3058f4e1331ad1d886f48170866
SHA1dac4d0c2a39a76530426bef95ad5a5d10b4b625d
SHA256c6e2deb30016057cf4fbe8aecdbbb7142332e3e561c98fb125797e3da6391506
SHA5120df3e761e000f1c7bf2e698be541fdd46c9f4bf21cf7c150a4ad6ddb447e834f53447ab8bf70a3965d8c77d2795b988f93c7f5bafb83b67d8a60b674a7ceda64
-
C:\Users\Admin\AppData\Local\Temp\F98A.exeFilesize
337KB
MD525e6c3058f4e1331ad1d886f48170866
SHA1dac4d0c2a39a76530426bef95ad5a5d10b4b625d
SHA256c6e2deb30016057cf4fbe8aecdbbb7142332e3e561c98fb125797e3da6391506
SHA5120df3e761e000f1c7bf2e698be541fdd46c9f4bf21cf7c150a4ad6ddb447e834f53447ab8bf70a3965d8c77d2795b988f93c7f5bafb83b67d8a60b674a7ceda64
-
memory/3760-132-0x00000000005C8000-0x00000000005D9000-memory.dmpFilesize
68KB
-
memory/3760-136-0x0000000000400000-0x000000000057E000-memory.dmpFilesize
1.5MB
-
memory/3760-135-0x00000000005C8000-0x00000000005D9000-memory.dmpFilesize
68KB
-
memory/3760-133-0x00000000006B0000-0x00000000006B9000-memory.dmpFilesize
36KB
-
memory/3760-134-0x0000000000400000-0x000000000057E000-memory.dmpFilesize
1.5MB
-
memory/4524-137-0x0000000000000000-mapping.dmp
-
memory/46656-173-0x0000000000560000-0x000000000056F000-memory.dmpFilesize
60KB
-
memory/46656-172-0x0000000000570000-0x0000000000579000-memory.dmpFilesize
36KB
-
memory/46656-170-0x0000000000000000-mapping.dmp
-
memory/46656-206-0x0000000000570000-0x0000000000579000-memory.dmpFilesize
36KB
-
memory/76056-177-0x0000000000A30000-0x0000000000A35000-memory.dmpFilesize
20KB
-
memory/76056-207-0x0000000000A30000-0x0000000000A35000-memory.dmpFilesize
20KB
-
memory/76056-178-0x0000000000A20000-0x0000000000A29000-memory.dmpFilesize
36KB
-
memory/76056-176-0x0000000000000000-mapping.dmp
-
memory/102408-180-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/102408-179-0x0000000000000000-mapping.dmp
-
memory/102452-186-0x00000000010E0000-0x00000000010E6000-memory.dmpFilesize
24KB
-
memory/102452-187-0x00000000010D0000-0x00000000010DC000-memory.dmpFilesize
48KB
-
memory/102452-185-0x0000000000000000-mapping.dmp
-
memory/102452-208-0x00000000010E0000-0x00000000010E6000-memory.dmpFilesize
24KB
-
memory/102484-209-0x00000000014E0000-0x0000000001502000-memory.dmpFilesize
136KB
-
memory/102484-191-0x00000000014E0000-0x0000000001502000-memory.dmpFilesize
136KB
-
memory/102484-192-0x00000000014B0000-0x00000000014D7000-memory.dmpFilesize
156KB
-
memory/102484-188-0x0000000000000000-mapping.dmp
-
memory/102488-152-0x0000000005860000-0x000000000589C000-memory.dmpFilesize
240KB
-
memory/102488-150-0x00000000058D0000-0x00000000059DA000-memory.dmpFilesize
1.0MB
-
memory/102488-149-0x0000000005DA0000-0x00000000063B8000-memory.dmpFilesize
6.1MB
-
memory/102488-151-0x0000000005800000-0x0000000005812000-memory.dmpFilesize
72KB
-
memory/102488-141-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/102488-140-0x0000000000000000-mapping.dmp
-
memory/102540-154-0x0000000000949000-0x0000000000973000-memory.dmpFilesize
168KB
-
memory/102540-175-0x0000000007780000-0x0000000007CAC000-memory.dmpFilesize
5.2MB
-
memory/102540-174-0x00000000075B0000-0x0000000007772000-memory.dmpFilesize
1.8MB
-
memory/102540-171-0x00000000073A0000-0x00000000073BE000-memory.dmpFilesize
120KB
-
memory/102540-146-0x0000000000000000-mapping.dmp
-
memory/102540-153-0x0000000004CB0000-0x0000000005254000-memory.dmpFilesize
5.6MB
-
memory/102540-155-0x00000000006E0000-0x0000000000718000-memory.dmpFilesize
224KB
-
memory/102540-156-0x0000000000400000-0x000000000059A000-memory.dmpFilesize
1.6MB
-
memory/102540-163-0x0000000006590000-0x0000000006606000-memory.dmpFilesize
472KB
-
memory/102540-162-0x0000000006410000-0x0000000006460000-memory.dmpFilesize
320KB
-
memory/102540-161-0x0000000005D50000-0x0000000005DB6000-memory.dmpFilesize
408KB
-
memory/102540-189-0x0000000000949000-0x0000000000973000-memory.dmpFilesize
168KB
-
memory/102540-190-0x0000000000400000-0x000000000059A000-memory.dmpFilesize
1.6MB
-
memory/102540-160-0x0000000005CB0000-0x0000000005D42000-memory.dmpFilesize
584KB
-
memory/102592-195-0x0000000000410000-0x0000000000419000-memory.dmpFilesize
36KB
-
memory/102592-210-0x0000000000420000-0x0000000000425000-memory.dmpFilesize
20KB
-
memory/102592-194-0x0000000000420000-0x0000000000425000-memory.dmpFilesize
20KB
-
memory/102592-193-0x0000000000000000-mapping.dmp
-
memory/102608-157-0x0000000000000000-mapping.dmp
-
memory/102612-196-0x0000000000000000-mapping.dmp
-
memory/102612-197-0x00000000011E0000-0x00000000011E6000-memory.dmpFilesize
24KB
-
memory/102612-198-0x00000000011D0000-0x00000000011DB000-memory.dmpFilesize
44KB
-
memory/102612-211-0x00000000011E0000-0x00000000011E6000-memory.dmpFilesize
24KB
-
memory/102668-199-0x0000000000000000-mapping.dmp
-
memory/102668-200-0x00000000003D0000-0x00000000003D7000-memory.dmpFilesize
28KB
-
memory/102668-201-0x00000000003C0000-0x00000000003CD000-memory.dmpFilesize
52KB
-
memory/102668-212-0x00000000003D0000-0x00000000003D7000-memory.dmpFilesize
28KB
-
memory/102740-203-0x00000000009F0000-0x00000000009F8000-memory.dmpFilesize
32KB
-
memory/102740-204-0x00000000009E0000-0x00000000009EB000-memory.dmpFilesize
44KB
-
memory/102740-202-0x0000000000000000-mapping.dmp
-
memory/102740-213-0x00000000009F0000-0x00000000009F8000-memory.dmpFilesize
32KB
-
memory/102748-164-0x0000000000000000-mapping.dmp
-
memory/102804-167-0x0000000000000000-mapping.dmp
-
memory/102804-168-0x0000000000CA0000-0x0000000000CA7000-memory.dmpFilesize
28KB
-
memory/102804-169-0x0000000000C90000-0x0000000000C9B000-memory.dmpFilesize
44KB
-
memory/102804-205-0x0000000000CA0000-0x0000000000CA7000-memory.dmpFilesize
28KB