Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
873849dab6ba222fb20baf34217cd4d4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
873849dab6ba222fb20baf34217cd4d4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
873849dab6ba222fb20baf34217cd4d4_JaffaCakes118.html
-
Size
175KB
-
MD5
873849dab6ba222fb20baf34217cd4d4
-
SHA1
cd869ab64a31f5401d57d4b53b9ecef5896ff1d1
-
SHA256
579157504af7f2d8fb6e80194c4c5db7a5b72ab242274d692a54aa89eafab11c
-
SHA512
7155475d85f2d7fa3d2c08ae24e8bef1d835a09ad0ba81ddf8afb7d91126e0196b13147e4a33331fcc4b76a2ffd2d3b13bcb4dd66f211a9333d4ac6ba6248b69
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3eGNkFGYfBCJiZ9+aeTH+WK/Lf1/hpnVSV:SHCT3e/FPBCJioB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 4584 msedge.exe 4584 msedge.exe 3224 identity_helper.exe 3224 identity_helper.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4628 4584 msedge.exe 82 PID 4584 wrote to memory of 4628 4584 msedge.exe 82 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 860 4584 msedge.exe 84 PID 4584 wrote to memory of 3596 4584 msedge.exe 85 PID 4584 wrote to memory of 3596 4584 msedge.exe 85 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86 PID 4584 wrote to memory of 4312 4584 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\873849dab6ba222fb20baf34217cd4d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee9a746f8,0x7ffee9a74708,0x7ffee9a747182⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,548081110627679122,2952423599770250915,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5305367f6d62e93372d7169ccd14b433c
SHA10faf86d5b678a65a70359dd3c1992ae7b7d98efa
SHA256ded81d7192901fe1c22d8b2e89f1cad41f1677bf6407abcf5c280b24b38f5199
SHA51258123fb974649584f4d69812c73d84b257b9a94c39b900e08755f9e9bbda00957a2d0a68a1bfecfa91cef61c7885fe9b3340cd08f76a08e26ef24f7f61561335
-
Filesize
2KB
MD52aa0a38998f90dc47fbdb6f7848dddab
SHA1bb1d3cca5e755bc247d2c4c85e79cccd82c4afe0
SHA256430a82335ff30f5e5de3c12995e153cd991c5dd66591cb1dccd6366ee3414806
SHA512209cbe25daf1e434fc6969733ffe8871384d97e546d798c19b207ec22cc67ce8aa09ff88ba7b511723f5d951d7f2e0ec38599547f8da730e134549b79cb24c48
-
Filesize
2KB
MD5eee654d2fc375d16b415a68e68a86be4
SHA1b1b83da03ebf53482e734154e3445691cc9365f2
SHA25668817d2136cd478836b2acfb13b45abd1440df2a84ce3b2f87eadfa6f5f0f65d
SHA51215c023fb63c111abfb9528f4814948662da7282967edf9295bfe51544458ebe72a7e45404186f1a75c58505f0e9c69da813d6316673ede5465600467dd7006df
-
Filesize
5KB
MD5b7694881f2bc7a0f0329b46a410beaac
SHA1bc4537177f008a6d6a22077e85786bd62b74f581
SHA256c95f629cff28e4bd5a110b0283cc10faa0e5f63ba1e7221e62d2a65293bd82fc
SHA5122c3e09889a206cbefe1a4319ecbb5321e756a7c6a64c2c0ca6ee811679800c95d1f31d87faeae69c97d7f058c3ee080d31c82c2bebd85e7f6019b419dc5d63b6
-
Filesize
7KB
MD5b21feebbbb4ab94b8fb78b057064a166
SHA19c4a47f4a8545fcb1a0d462163a16346c5317283
SHA25616975cbcb7258ff74c2ec0e119af13f99f5b30b2b4cc73e4f5848e6350e3743d
SHA512d92eb224f47004a88963fd45abd03c4cd998f83fb8a278e50bd1337c37796b65ca22c1bf4bc6cc4c8c8ceee50b304eaba4a15f1399dfe11b6448147c900d2a95
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52b3b019d566b85ea5134e8aff0d32739
SHA19cd1823fed20dc30c7ea45f79c3dda45ebbf53d1
SHA256347c45d2a07a7aecf6d37b1524d4bff52b724b0d3c1938a1b97ac3016c6eae9f
SHA512a9857467d3ec5c830a595b1de22b132b29e857703da42438f8c3f2ed873c7e0bf0da0466b85259bf62a0f58cf64fc29fc4e024c93d82938966a9dd9ca8895ab9