Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
f702b4c440bb50316d6a0045978a29c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f702b4c440bb50316d6a0045978a29c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f702b4c440bb50316d6a0045978a29c9_JaffaCakes118.html
-
Size
6KB
-
MD5
f702b4c440bb50316d6a0045978a29c9
-
SHA1
53db02bad5cf641c496623bc87ac89f387893202
-
SHA256
b5763176d196923f6699cf79d56683e4f99f7f3eabcb20025b235c95b54606ae
-
SHA512
e14fe0497935ac37b06ef9880c742a9b3f5a4fa792bc8ea7637b6e83a3c964d0995c008e1944cbdea463d39d0929c12d47c871aa80ffec8ce7bc7cae7ba728f1
-
SSDEEP
96:uzVs+ux76jLLY1k9o84d12ef7CSTU/ZcEZ7ru7f:csz76jAYS/ab76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000090679410b41ffa09f4e845992f0b97368314c6b959f17a2ca6373fa4320c0ca1000000000e800000000200002000000046d41523d1eb9f4a614f76b64cc38fee895f338ecf081b5c321cb93436fc3ceb20000000e0270c55b84e6fd29116b51922db6ea2d20a595aadcad68e90353c9f01a2531a40000000211c1efe819b679ab679bc785a8009b40e4c91d97f934f9ad6ab8efec9126d3f045fa74c87fcc8f53873fd0c3034a8eefefae565ad2d9bfb0dc23df651805d9c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433466488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B331AC1-7B90-11EF-A58E-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70acac619d0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2876 2684 iexplore.exe 30 PID 2684 wrote to memory of 2876 2684 iexplore.exe 30 PID 2684 wrote to memory of 2876 2684 iexplore.exe 30 PID 2684 wrote to memory of 2876 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f702b4c440bb50316d6a0045978a29c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5be8d68ecb6ff5f9fe7785e9767690
SHA1f2d95c771caa44bd103216d83392de49cfa11363
SHA256f97636331573293608389b34d57c36a2da98933a8aa6e4680efd3bfedf38405f
SHA51292e05b087f2d9bbff43670dfaba32458e720e6cfd0374edb965c651e90d9b079217f7892629b4da9e3838345dd60baa530ed181e2322f68a568ef2223769c0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aaa8ea19b29b7bae5d73b71f6876881
SHA11fba292583277ca636c4e39e914a8de75deb81e4
SHA2564f87247e346c34952ffb519cd65e06304d41820418d8c7f9fe6b84bb059a164d
SHA5128fc4fa613dad6967e2b222dd5ec9475832752cbf91ed656fa469fcc6b280c6eb81f9c95cdbdf6739f6860d22179c1253947567a7ea56964f95f3d4893ffa400d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f54d6b2095d558cd6ad7939d1091c69
SHA1603fa0e54f007dd3866304a8fc324b9dd63d2404
SHA256e092bf1d37573a42a8750b7544fbe9fb87fe60ef7376311749362944eb37d36a
SHA5127a6c9e1c7e3aac874be06c435c88620613d1bf73cf8ece7c22ae6e627cf6c16461b1bf3ee6f5cfd72f9a714356b4d1c5a8755d7f83f279371a423f5a3d35b1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089bd65ed31cfc5d0a7dfeaaa57c21cf
SHA191b2bf8f7ba9afa5d405069ea957ab6013da0596
SHA2561b1e12605813c9809497b9a8a810e6bd28038899c6e644ada7a70888b40fb7e8
SHA51227f0a15a7cb9d728413da577f071e03971967f069a35b98a2094b955098e6f4d354104f1ee32c87dd456865760c137d8571c41b49c3f1669266b28586d99fe35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b356c76c533ce65cdfdea6654f5a4e41
SHA163142e9fa2592fbc7b4c3adb3fd141f3b6c42279
SHA256ca13ecd3494be30f3c21f19047db1c1b5b5efbd2e49a4aa85b02d014213dfa6e
SHA512490571c805aec3d5160c9702df69a2d790023e75e832d2cfbca88d543e44e73a948b1de853cb0eddd98f8f182de80e93a3ccec7dc29be2ea78ef7ef82a03a19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a29b948dda8bf6a9ae354173c4277ed
SHA10cb4890da42effece041db686e16ec2dd1425467
SHA2569a3e5eeea98f7f1ddd12a8c78605b74e68869bda5b0513a532a68c8c4a51b2b0
SHA5124d0696585c2040e12000ea1365f1279f927e8e2d99a51bea39ff4f2a366ea1cd9acfdc16a26cef15b1b77661d6c37599f0bd6fa449e15d1c3a928babdd789a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543924b61ec80d6878483c020f1fbc223
SHA105e2a33531ad09dfdf9677a225c5242a018eaf3d
SHA2565fd8427b7f4f6aeca2f87a885c8f636511c3f46beeee7902547dd26e26ac96cb
SHA5120e7cceb370c41838f46b104b29a5ca74f7254131b84e4d8853571b78ec876358e72572f43fe1403900587881faef52383ff2d80eba08c38e2dc034b59f9e363d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42562138378b318ef82ef16d38fa81a
SHA1eec40aad61bf842bec19dbc78bdf654cf4bc1aec
SHA25646cdf5a4aa90a20bbe38896c509bc0e59b62c4fa20a5cc447f5f2e1a89949f49
SHA5125471efa59184de838f7d4200f0ebc6ee09cc0e3337d4bf95bb2e961703b96ec35ffaab72af0aa9b76e076143172169b5da400901781e02e8437b0fe0e982840c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b487f8b8f376b39810818cecc711163
SHA172dd988ed9483c03f6bc6e439abbca213dd26f65
SHA256af8f8099ff2ed880579d228c66ec449622a6558ec6227ff18db2d8c90d328f6e
SHA51240dcf78018237e02e8a85597a269ea74cf4edac211b34827a698dc975f77a57cdad69d061320f8ea5334863b002ce22bcd4d36c2be4c91b75ca718da20bef804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519cd5ef6fbee6f5098357895c9010959
SHA1b7efaea3271b295d2f37c687af47e836c99f4582
SHA2562ccfc8dc3a8e1a8f1dd958a08eb9caa3229b8b40a812e3ac61228c1c73ffffc4
SHA512ced3c53fb2b42a0304fc46bca37cc09a6612d2a673fc06865df0b3f4640b68d07449f4cb3d7389d8589efc46ab744d7d65e1fc1b892b165af732e52d2682ab8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb96f389927c178d483d4920e0cf9e2c
SHA120347fcf659c1f8da0dceae32759feb5003a69ae
SHA256e8d3c5e0f2c581da7c9706903d7f3cd5c0f860223269581dc207a953914aff0b
SHA512ac03cdc2256c57dbd258d5d76ed944caab88e415b32066bbc2590f8300b5cabc48195725c021a92553408fa1ff1adc9358ddf5c5b4c5747513ffbe0f2b1d3db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f09c3c11a2c5e0c1412300f09901b10
SHA12f89028a6e305993393233c115be4d93b417913a
SHA256bc1afdce054239e06b4d7984c46cc95555a2c167b174b2d8edecde28857198a6
SHA512f33fb8a301c9aa77731ba0fdce460311ec709a9d2c04f2b9370ad20e1829f69ba2d2306f40d85b0f2e1f8ccb57de45de144aed31073c3ed9c502ac71a3489f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3519527a08b84c7aa28d1ffc7623dc0
SHA15fe0a43f6ed947b3865a543134f5b457480447c9
SHA256081b937d7175c15715d7bcdee7be8c097f54bfe7d8267af5c330662797f89c19
SHA5122598f2888cee0c9f6bff22059062147a3dca27c36c84fbbc9252360c2c3042fb7ed7d5aa84194bdb22bb1519cae63ef20dde29f846402aa60aafe063493abf45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50afb5eecc1dc4c1eb701995123a47246
SHA1bd3eb85535256b47f130e84fec5a39012de9869b
SHA2569566fe80455e477ac9a5c9d3490ffb136ccbf1725fd3b10bcf6ac81d2e74b495
SHA512eb4e9f308641dfa80cc77470aedb7e7a59ff2353a712b19c1596d63c4a4fc28f43d0da5419dc0fd556078bb003fa33adaa9aa5ab7bbde40bbabc6d155b1145bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c001770b5a25351b41726b2e5707f2ac
SHA11e899508cd077e55ac0ebcfb2ec8ea422e70b635
SHA2569cc158bc04783013f5cf039d9705fd938eebc06ccfb3466e6a72eb625161484a
SHA512629976e91cb9d7f80fefce710f640859d03918f599cf95e61296ed16e9018e952611c9ba3fdea6214dd5a0ea56dbcfc285b71cc28796b253c682c61d0ea28a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3f9d4509689483faa9fbfa7b54f79d
SHA124d8a5fb3299e1c9cb6aadc00b37fecb4b9fb003
SHA256a3091cb375a50ac4588930f8247928db980390a5c6f6958bce4276ebf8f3a23f
SHA5125712033caf8f1df9739136eb89926e0cad9629b770f0f5d95df97d41eeb50af71d4f7b2ee9845908f72b8d51f767c2f40724f23a4ed2b56a281b0d7cae545406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012d72dd7951bbca0066ebed3f4be57c
SHA1f5c051f5236819fae8405abb1f6c24b4bd47c780
SHA25624b63e747cdb5cc84ffffc439214562f027a96db12cbcf44de59f9c6dd7dee5e
SHA51280400eb07ac913bcb326e27f4d196614549f176cb65d13ca9abbc515cdcfcb35df9e73f1e629e4d169f5af81249af65ac03aceec8b9e16bbc7a4d0f0fa41cd6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda48c0b13d4396e7de0743a7185d0b6
SHA111e7a10ba8478133a371aec5c798883422c2ef7b
SHA256ed0ed3b582256468171be729a513b4ad6a26079615eb947e6ac8de305aad52f1
SHA512d0844b64b5bc65b64f4f8e98427c8d66ecd8d1ae55b47e85de9a4e681444613e911236840d51bd1309033d20e0838ddfcddbfea7bdec385b5906739db3799fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504395ca9f1e51c669b6e49eeff19b837
SHA1a23e49d64baff7fbc774cd73b66b1d4d50466018
SHA2560852b25f7db0b76ac8c47737b9e819659e101173867ab6b56cca47ac34918ac6
SHA5124dd9dc0e718be42c4f0a81c0a5553a2668fa01894cbd6cd3824ee06fda945716341015cdef57bc5f52fa12781e616e60fd3c53a7dd9af238813eddda08b2fc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb1cd9fc7efbd2c4716e5f68a05a31c
SHA1eb695630cc15646cd970059e4b3f9f430fd26dbd
SHA2567f4e6728bb43466107584b414fc5b3d231bc9bdddf2a8111351bc5ff6b446b0b
SHA512fb985637da1d42dd15b23cdf7693d2bf66d2bbddafe13dd6e705f5722c52aa51873876fb59fb399703c8f5943da18741c11dd209b1e28fd5e0cd3b21b61d0858
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b