Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
d2640e95d03514f682db8ae78be87f05_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2640e95d03514f682db8ae78be87f05_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2640e95d03514f682db8ae78be87f05_JaffaCakes118.html
-
Size
19KB
-
MD5
d2640e95d03514f682db8ae78be87f05
-
SHA1
8782fc5657ef6a0a809ea3aeab5fde86a5ebb67d
-
SHA256
2ee9da469aeadd3222970cdf77ec85620f884cfe359a4a2a2aa834b419d9ff70
-
SHA512
fe06d3a0cdb6581964a0f36e249df24c5732f3791685d9e91e4b250bbcf113e5fff4fd59a1a602d2df48fad192969d9318ff91d7089bc3a086159d4bb7c68d22
-
SSDEEP
192:2ehCaWv7fwcGR70tlSryvT+OUumDNGsziNCEl+z:2e4VvvYYTvT+uyNGtlM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307cc6cd4501db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008f33c0835a4ba6aee71c9ccfdd4eb580c20a35439739b9bcaaaa8af5f03cce97000000000e80000000020000200000008aee7c6b8c496122e04f532cd18474f133a8d16c000ecd7bdda8c6161b3ce04a20000000de5ab1b8deeaa78e732199566636db1534ffec43cff526fb138a883b5e5ff0f44000000079ec3ecb4674c5a49051f360b6bb34452ba858a479c103df320f4bdbec010564ec2f30db8652e40e5de9ed238fd887ac4a6d24b1d5b1ddeb5927c62269b8ebc3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431889567" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5E06231-6D38-11EF-9218-EAF933E40231} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2640e95d03514f682db8ae78be87f05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a94ee2c09b8b99c23ca5c1cc022af7
SHA1912acf4a0f83d25610f5cb9eb29198c74fe9594c
SHA25631c62a2e638cfe9288ea5a9ccfd628ed1b2f843b6f1e68dd9a41392834298c0e
SHA5123df9ace0ac433c2edb3372259dcba7bd16bc2c6c4bba00fb2409dd9d3463a09f1df593f9268988c5f6413171e3326f510616d2bc33625f24ec18dffc482b4289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4779df3d4f7540d12e3d3d0e0d32312
SHA11fbe407eb6a69fad7cd0ec500717b44d3d39080b
SHA2568e8b494a3b3392e679569dbdaea0669dbd0671ea05ee52f3b36e2ba7f9106002
SHA512f12bddc18d3a7b7a78742291146b4d026a3bfc7e46ba5a26b561306734d3c41ff17cc7082b27c512931301ce400d6d2db9122fe4fb33bc8710e18007591e6c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9c79d74f8e82b265e1c26c8b221b13
SHA1008268908e12a5fd0bcc4e0a2fad50aba3748b3d
SHA256ccf09d7b179a451ec9e333bb7c7296d44efa2b0f452fbb3e3dbf6a02a7d78707
SHA51253f895b358b02e77d7e5c3ab5898583dff475e2a050debe47dee7d2407c96fd85729571ca3dc26d14d09dab13ba2271986ee169d194c54acc1416751498110c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f443d1e2cf3bfb09cae50b014325b1
SHA1957de66c26c46c2941f2b78985aa7bd1ff9545ae
SHA25631ff58e5772ee78fd38e2b7e362261cf806d0d40d9b84cf9cf89a186f1307bf1
SHA5129cfa6104472684aa3761445722071a916f80c2b1da4fd466d4a64616217031640d66728fff0f2040cb23d122e6532dc0b421015d190913de200517f30e01eed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3a37f1c0dd0ae0c99a406166f07eaf
SHA1fb526af775f7bac54d299b9ffad1614863a47f5a
SHA2567cb514eb6ac6759e3a52f95cbeea16213efea41c6accaec6a1cb762bce7a4004
SHA512bfdb32a84fea975dafc3188aab5034185469bafd5aa17a4853ca1c567878fb0d0adcd8b0e1c4e9ee79529cc783f59b1b33889a60464d1ceed689f338c5ef4da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593414155cec52e49d500f7f2675fd16f
SHA10b7185cdabe2d5166af69c84fd381ebf58887fa0
SHA25637cc4d02aaf23d62bfe89358d449aad72b87053e42fcc494c366942220e02e9e
SHA5121a3a522a8d2680134fb6095722d88ee69bd9b05b321e967dc1e6b0479293c088dbce68407300acad4be061fd40533ba96106a8faf981abf8e667e0ada5f72d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0c0d02d2ad4cfd3e8947d772577132
SHA15da03de9a70457b499a7c9cf588f0c08223dba3f
SHA2560e9a8226f2a7a07894f71cf189ddb518de383b344c9825ebb31057a3eeda0788
SHA5127bbb44300d56966a26a033dbad0ae1e0d39e73fda319f9b58e7c6894d2682c2fec025f66adf6404ac3b7fcde869a8c5df11e7a8aa858a3960a9b78697777f142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31cbf2844586c31c47b446cc44871e7
SHA194b3a66b3aef24cdabd764ff1255db532cbc2bc5
SHA256607d45c3aedb25f0202563bf22bd7bf339800328f487f03d5b313a1620d5647b
SHA5121bb675bf3845692cb26cce581ab7758120357f4fd7c303722e2895cdd615787205755103f926d33496293c74a6555142e9bbe56ea4817f7d4e945ecdb36675a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417c038e0c32f4cb71e8f5b3c5b8c2f7
SHA1768d7fa9dcf5ab13cf049b43c98dec9b762a4b5b
SHA2564c6184f4c344a561c03955d314195bf8dea0716fb920f3a65a0790ec3af779d3
SHA512d025144636ca48b1cba417bfbb4281247f66ab55a4037c4bb5b59ffce159a7790c9c393778f4d98f7baf3f49c2703b4b0133a825f0e7ad5da9c7e94e36fc4b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56e3d469b9cbda83e7edc71063fa8ad
SHA13f9eb3707f8b090a28b7809794d9b20db7432c1b
SHA2566394e5134df5ef98a7f24739bec06041f35944a854ddf0ade946f34c433681da
SHA512ca2a6f3262047e729d86d15e0bacf57b7c1962e2eb58ac4cf6b30ce2d5b1b030e11a340f596b716aba6a05571b603f5ccf563b83b87378179618c878937bb73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006e5341c87ba625a9e09708a10f4cb4
SHA140a82f18d2bce28a3a6b35f2c28c92c4bfffc85b
SHA256edaeacfa7eed6326a2800965ec223cc28b0f00112cb8b39c8f20496c1e6b3388
SHA5129a9150f5beb2d309723436110800f47bc93a83b69e31a6d98c650157232798f8774c59d1cd9b8d0d7728fb8268d6ef42c82db89bbd9f1a0b990f2eaa94225305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf28284755e877ffc6b865f938cbc126
SHA1c8ccb10987424f2d4e1c31202d3b8783c3c6728b
SHA256971f596bf4a7dc2cc8938f3307039438740d5284b0791b6e5e8cc23889488cd7
SHA512a6cc4ec7af09a4b7de37bd4209a1b6995c8a198c4af322bb5abf7c8b9f49b80f3902366c9d450e705a62d267a133d9aa1f21fc01050be2673d629001b25f6868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf12ed48d193fad6cd23c7ca65034c41
SHA1bde0050834cf6744a8ef30eedef1bb1221bb7b5c
SHA256388e5cf31502320efd552e41507976be3907a5752e4a4df73ddca17ba8b2cdbb
SHA5128566820d12ccb76fb380b5c1ca051ce5d9bfaee25b1e892fb161412a2fc0cf5e297883c99442a4080b079af8cdace2d8795c04c4d4eecb275e649b23f7048921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558dcca9e1703f95ddf55f031b7384ba2
SHA14ce74ef659752cd7433b96cdd6e84ecb1d830ea9
SHA25639a1efcc9821d8a092d2c691d5717b99d860db0b8b11b1079726ceb5338464c0
SHA512d2b42febd12fd61ea4dc4bbf56060f5969742c0c33e04fd7a390f56a803c8b124539905047e25d7e763c0e27878d7c5391aa95c06c4296a49103f848bbbb63a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adaa405336b6e4a15f3e5d7ed16bf234
SHA1437d3d46c731b8473ef13c2429b2cd74dc006d41
SHA2564a94bd014aea6a44e081bf9ad111ca5be11dcbfd2f2dbef4cbb3c06e1c5671f1
SHA512d041a5679ae19dca3113bd0c87f7348966b29251d75becea3eb01fcd15937d8e067c5b9c2d8f4319eacec9b4c1afbf33468de58a955325f1399107498b2eef81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc44aa6588fb1e77f4cb3ca0a7ba3e6
SHA1ec97820d89ce4030c652045bf1066ce5d796f36d
SHA256279d519192f51d68f01df137e4f3679d04b0edf75dc35607da6c2d2f53ca0665
SHA512e69e2845dfef4baed82aaf7d15f47d32fb0ec5876a70e773202ccd51ff9ec4237e75a328c9d8e682ca06ec581cd3d619c7adc74c6832b006890fbf486f36a7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac25160a9bae05eac39b8b4f61f38375
SHA1bb3f16ad106f8bb58b70450d046be99e32b19a61
SHA25612dd0c2156c1fe86b24820e2393f71d578f4e1bf7b4d5d1ec77246f83b0f1208
SHA51229061e8f533595478d09f1168573b4e31a65a42836a5c19f774fb05762b63eec655b0ae95fb67690b3ba93065b5f87d8c79a6d36ee0ae9aa66b572e2a9d30e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eafe1b6de8b8130a53a83bbedc8532a
SHA1e24e30b471fb167be9225467e2a19ad63f09c768
SHA2562859ddeefad22e79c17c4c76d2218111c2e493ba9fa831ccd69d7a721bb46130
SHA512bb8d226726513173fb9b47c3ec2474279cebb48385abbce76cff31dabea26900b332c9058cf66475d9e450da862ac7e2285bc7f2e136f8a843d289372946f79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8676ff8ac7d195f95d1351f9a3a482
SHA130f7cbd6c763c1126adc5b807589d6821e0971ae
SHA256b4df9b5bb3cfb10d63c9752f7b3a0f43799601f0705e89217f80ca078947a1ae
SHA512e5c8cb62276f3e9322324effab7853e3a7a20806555550d88d7bb65e1036177ff7b0b32b28a0ac1a006ffe7068866713b606300085dbd8649fd5392092011ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527993dd66016e9de6a12e9ee1d11e7e6
SHA15c67e3b1ced0e60a227ece45ad3f05fff81a7950
SHA2568007e4f32c7fb317d7fcedae5efd69363c2eb28e14e743d0eca9b524b89c42b0
SHA512124c831715e52825df89fe3736fd7cc144c8521c7e60518735d93c18989b761a1334fad92b925b7e1d476b8aaf14cbccb0c2aa93dd0c06029182822f2b371daf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b