Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
c1a4abb9ed8e94d9cd67c50954f3eb17_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1a4abb9ed8e94d9cd67c50954f3eb17_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1a4abb9ed8e94d9cd67c50954f3eb17_JaffaCakes118.html
-
Size
14KB
-
MD5
c1a4abb9ed8e94d9cd67c50954f3eb17
-
SHA1
448737c1f60f187e89265d6701c3e25544d48be1
-
SHA256
bae3fb776d2b345e1190f71176f2b313b2cd00577767e9c025a950243b7b96bb
-
SHA512
ee7518c30fd82e7808c2c397b7d90c2d6aac511631588fc1f47dac03a7f2cf71678cd5b28fdd95fad9e800ae7e7a337a0841b08d898b9c7710511fd962e3c340
-
SSDEEP
192:CyiOEkQARldjbXLv7wHGuUCVCf73Dy1w0MI9REZ5VuyVVjzvR/K2YBNF:Cyi4QUH/D8mFAi7zy1w0MIEDAu5/tYvF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ce328d37f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000982be2b2072cc90d39cf898133b6a7774a114032ae30a2663264b169a2e18f4d000000000e80000000020000200000000089555b6c019e9a47b6ff68b9d95c6fa05661fb3a215f6d2c7d6624cd6c2d552000000086ca7ca5343def91733f754ccb0af9b7188a9ba01acb502e61613d1a13a59375400000008bc65565f7230cca1924135a425ba90cc957f0b5562f17d7bce33d83b2f23504da08f1ce4684c59b9d577a479bbf48fa146f0f2816851899688a454eeae25bc8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430783926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7AF6C31-632A-11EF-B586-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2692 2672 iexplore.exe 30 PID 2672 wrote to memory of 2692 2672 iexplore.exe 30 PID 2672 wrote to memory of 2692 2672 iexplore.exe 30 PID 2672 wrote to memory of 2692 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1a4abb9ed8e94d9cd67c50954f3eb17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeaaeebad1c93a4451a0849875783d91
SHA12a61d8113091c6be3489e7ff5c33965b43b868ae
SHA25639bd2a04edab2c9ca58ab95782d25cf28734c454d1986c271f2d525df02ebaf3
SHA5124931108d1376faacc7a57ca73609f27cc199c61228c396f484ed783402ac387a0bc67554f90911a97ab84b14e8cf1e952cd6b63eca0901f5e53bc18188064c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ccc3a0d2e5f6e5699222f53242b4883
SHA179a693baf5574f47ccb5e23b3c4ab2c0ed715b94
SHA2565cebf6cf13561ee51526df8f0372307de32d4bc1193d45a5a5d3cf93fea58f50
SHA5126fbb73d03ce8e41355dbe0d87758c9624ec349619124642419a2a9b120694274b444ea166a86705e1c9ef59b8b17d127b36719a2f25a8269ef0c90874f6e484f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55900e6ebc47dc2856c5990dd769d08ed
SHA152643c9eb0a250735f01e277a32922d21389ae0a
SHA25625876d7bcb1c396f55d5c20eb86536722be6e9fb4773b031e0321f51b1a20a4f
SHA512b45aca75d953e61b51325e9a9f4f0cc468174eb610700353f82b514c493c949da022b68857daebe26d873bcae47f73dc56511d7e14edd822d9c917c7fdc1e419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ccba7fe08778076cb552344bf24eafc
SHA10b1e9871657bcc24a1b72fed244806194eadd925
SHA256d324c9736f60ce9391c637ccd3e1376779c40db3d00f7565e16987994717f8f1
SHA512984c2563d2e80a3ab410682291b8624a1d53cc4121ad630ac0ab618e5fa5d5234cd17f4011f1567c41451175bb27bd009b6d98524b6581c54faf52c020310e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4431c7155cfd9bcf20d69f690641fa
SHA1cf1ebcfa62cd35de070cf5d3f912967153a5ae05
SHA256dae0b09e40ce3aba3b24a61d5c766418df0a76036d5bd7d0cc939eafea721029
SHA512391bab87b0cb9fddcb7d45114a00433c65fd889cae4fdd15af4f3e3ef8b0f990bb7bfd73feed615806f551896e463ff046a5b67a2adafb3e123fb7ab6c594959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d16d647f05361329812de96971b21e
SHA1a8b4c854e69918dbfce2d15aa6e51b3b33638ac9
SHA256f911d3c5cebc6a58c2d569bece47a2b3f8675ce6ba5b2efc1a0eb587fd2b9fc1
SHA51230ea52fbc2441337d3c8a306e1e04070827a9cba2abdbfe70858b9a00699e105184e10ce42a781fa160753307e2787fc08c80b6d836624668cb2c5a95e6a39da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42e77a322e98d4dd609cc8d92dfd687
SHA11d0a06a6a6ba9ac134ad31d1a69b55f83a1b1251
SHA256fe2fbcea980fe50db193786f4ffd57334ddf72de15bea22f74be690bc64085e7
SHA512cd1709cae97ecf599d789c021e93ca17796af3655da921fda33c431fe24cf4f4ce90f50b40ec01a5da608b8a22b1fc86a36f0b6c3b9be2fead76fe558978aa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b37a410e68c7707f7811b0210ccda1
SHA110d1eb4b6c00b22d89a5eb4470ec50666d7220c2
SHA256d2f9eb2e1af33d3d7a96d683d805bde698f9e2ffef3645d43d1fd6a3df1b70c7
SHA5127d14a8de350f270a9363efc9fe1f0d2966237c5af957e17953a1ced1cf3c92dcfaa95346870858a746180a7531afcc1bbef7ca397961d3665c2dc2fbe9e869bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad30163196dde6f3a95e512e1178a4e9
SHA1ac5c1a964955261ffc70c2874a9d24d59ce74e22
SHA256361f8cf82a81821b35f48a95f236d54d34b5f2573adad5e7e803185155a89cfa
SHA512ebb479f7b0936712808b36bf6c8ae328d280ea08c5288fade28d944c286e37a84604a34546e0cb72eb1f89ac427c82438373516e49c505005dd30014abc3301f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4a89fcf609d396c336cf043e1afd90
SHA1fc040b8932846989565373424272e525191e54e3
SHA25689af42b0feb6fc6352e7af55584f75c5efabbbf323e60331483ade4525ed3002
SHA5120eb123bfc3c838884dd90498aa92713edef6e23c8bf7b331476ff86a3972715eab2bbeec08ae5a6f34992a2b339a99663970606e566c9f4639ef9602faac18ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845953e0e8ada1c17a21c394a88b94d2
SHA1149b0f7fb635476029e16a37ef89e3542d913d27
SHA256a5680282c8073ad722f8001b7ad298254247b8eeb9d4207f7e10a17e8012e3a4
SHA512b07244cd5b5db330c745d06fd6452346184e66e921178d3e0e611a88eae09ad12dbac9fd895fdd44ad63461eaf3036acb359881d9bb841c8b76f9aa8e400eab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505426faa2c34a5fb1610c395b5f8f4fa
SHA152b42b430c1367a12db9de2c905cb08631ffd027
SHA256571445c40bbaa79a96ebe4e545d28faca2c6bef51d14bdaee8f4c5a98cb6aa05
SHA512b06150bcfb2bed7f5cadf71068fec0b119ad38b580df8068507a62446840c6a33d6eb9871af75ba4b4d7c4317923b4d0d3de6ff21574264c02d623c249f5e16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2f0272b91bf63d04d2c9feca5d482f
SHA15e1e6e59e46956080cd85e42a948dfc187b710bf
SHA25617b9984092b144e716c33622a680f8b7599914c690f4b3c30ab9911900e9a240
SHA512177dc59c2ddb98524e7cbe026cb0bdadb46adca9847ae6cd4fac92931564df30cfa83b2955869d381ef29b62a9c8b9d64e6102110896fcf8468b738593e7b31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53894e362f9a2b2e757ca5d8f060fc2ae
SHA10fac1167fe6bf53b176247e95bae05ea22e07058
SHA2563d70caba360eb20d3e8f4f95778cc14e4840f53d990ea72dff0feba7665224c1
SHA5128b560bbf5ac71f8369c672ac795d000d85703791572a90d601dae9065ef59c9b37b47699b0ef15173b2976a9d5d789bb0818d4006ac9e5b763b04b7285934509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dbabb2cc5527a2559205736aa337f9c
SHA114d90e246caaf52ccaf83c5252655dc02d96df1b
SHA2563d192605d3033c77d8e7e7c060447a320754c62ce2714afcc950d8a56be32270
SHA512c6081a6678b24fda132ee065169d43d00888d3761aec3d23304fa205c74e08efff34c1147ba35a7d15e004a9b42d16003734de4dda8eb9ff350fa4655998bbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bf56b5ea2cc84ed94badc8223d0166
SHA1976d3bdcd076b1fa292ba3a18a061aef95f0333b
SHA25632f0b0761c82a1e53879023118b3044daa33807fc78f19c7745f855668ebc621
SHA512f5cef4736985c3f5105b063bd7e4015c468baccfc13db98448e36890515bfb29775d47004863a4d7e889c956c9c32e98a28684326683526f25a324b7e0202754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7e8eb68d8f456a404c85829b14c5ef
SHA1d2df823e8cbe47d6cb48fc488a11cd57e30f8918
SHA2564ff4ba1608da4b67e8345eb836d6ab5a989bdce4c150ad813ac66a0fbe3f57a3
SHA51239be673b1ef6d0e12ca0f88d36b9cb8589278d18a21314b877dcdf4a5b05b4e2cf0a238e210251469929ccf73631f91c77119de315923eed9fac8a1b8f65221f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54279baab1d329af79f5a1b720ff001cb
SHA182b4afd13e63d8441cd39b7a99159cfd5d5ae85c
SHA256698929c5cb30a5ee38fa99182982e036195bc90078f83f81db4171457ab4c8a3
SHA5125f62c0dae909d81a89bf7034e3ef6cf8b2fa92caddccbc65adf470786594e12bb038def33e84c25a7aef135fcceeb61ff25d038f7fcacab918e323821680d2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6081281c820053947c173a8fb46a17f
SHA1857e7ef9a4a87eab40f190a48b261a401088124a
SHA256e6478c148acfa920a5ce760a47360c2487decc1bdc1e0d3153274eefaef1d354
SHA512904468fcf36b1fbf3a6f0ac95ca1b475f091bf528e1845bf8a7b9b2ac61837fb5043e89e7a40ef29971a29b6c49f63425742a5760f3ae4bbfad8b92e1ac56eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd538640dd96b69559f4673f5dd5f6e8
SHA1037bebe55e51e3790a14050659757e6b0ff838fe
SHA256ae6b63d5294d13da41798f10e4214580a39c05f06fea42723a194135eee85b8b
SHA5122efc0e30e25e434841f535e95b5c06729a96efee277e65a56a6612cedd5a53694a7af934adf8ee4830da59bbbbf45e7e2f0bc62e26ab844040b30a0a8380f1fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b