Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
ea82061ec8f7fc9833d6af82cdc4ad72_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea82061ec8f7fc9833d6af82cdc4ad72_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ea82061ec8f7fc9833d6af82cdc4ad72_JaffaCakes118.html
-
Size
175KB
-
MD5
ea82061ec8f7fc9833d6af82cdc4ad72
-
SHA1
c7e802f503f55813a9c3180ecc017e6ba53b0aac
-
SHA256
a2bffaada2b8640c815d957e67785bad8b76b089e8ee0ac6d9f700b9ea3f9c46
-
SHA512
7c1d3fc8559a6fe301a5ebc8e426518d9d221f6d291fa97de456713090f93166a8b336558ba16daabd6267a2f63c62f083b29e1f5074cacdc31a28d834791ac6
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3bGNkFGYfBCJisi+aeTH+WK/Lf1/hmnVSV:SOoT3b/FPBCJi4m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 988 msedge.exe 988 msedge.exe 908 msedge.exe 908 msedge.exe 3144 identity_helper.exe 3144 identity_helper.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 908 wrote to memory of 4548 908 msedge.exe 84 PID 908 wrote to memory of 4548 908 msedge.exe 84 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 2188 908 msedge.exe 85 PID 908 wrote to memory of 988 908 msedge.exe 86 PID 908 wrote to memory of 988 908 msedge.exe 86 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87 PID 908 wrote to memory of 1132 908 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea82061ec8f7fc9833d6af82cdc4ad72_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9546046f8,0x7ff954604708,0x7ff9546047182⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7637311161007561296,9899864585805627331,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD569186a5baa6e43cf49ed85358f5e87f6
SHA13532903a0be7b90e2333ef91fbb6eaab32ca3df8
SHA256c32300f667156fdfcabbeb8de42271fce46e484dec8b5be245413586eda9cacf
SHA5124f3955c982ed5d3f780b6c2183fc87ca9fa9cd0b9a3f69975d405de86222fb3a66a967b7572adfffdf2ce810418299e956287344b04f554885065b8141b1c763
-
Filesize
2KB
MD51bdc3c872194852e71915f7b74f52cb0
SHA1879adf975a34ef88054a2986ea371cd94da7546a
SHA25684b08a5bc7e4460baa95c4604808938fd9e63d59b9d6bd7272be923f1ae179cb
SHA51272a14e920fa67cde934334b351c20014c6be4ef84f2e86badccf294977cf674387156fbe3a4ccbf583293e2dcef66345cf25159f9ef6b400067bbed6c07e450f
-
Filesize
2KB
MD5379f67bcb84cdb10ba408d594f18ecaa
SHA1f3b80f91db1253e597521b7cb40ba29b3e517800
SHA256b9e05eade3a560a9f3f4faa09518ee9cb21d24c8fc24bb5b6ad6cd79e052f263
SHA51206961f6a413ca0a1139385452e7012153c0cdf41e2d9ed0e9153f08048922f390338e32729cb0aee09f6e4f1d65b8826f780b231e47898ea0421c8e25599df2c
-
Filesize
5KB
MD5e9fc6ba7b468626132ddb84c04194cbb
SHA1fbab1b89a23fe6dafccf2219494f09b0db295acd
SHA25685f572ce855296dacfeb4574fb2fca3839216b3a57350f48b17e574564fb0b6f
SHA5126767731fad63a04cfcbf6772177bce83994fdbb8ad8f688085634fd6357f8fdfaf90a2f71e7750352041ee93c68b35c682b75fe78badbb4762322456aeb4b993
-
Filesize
7KB
MD56bd9c03d5c0725e0a1be4a2263ec7819
SHA18ab5da2cb68cd509ea2c1cd432e5ae829854539d
SHA2561d88b4144b212ac0cf967d7cb5973c38b1656c18179429a42fa24486ae378b1a
SHA512dc8afc76012ba97c52e38481d14a88fb292a6905a10ef2f78ade93a196d7dca9d8122e22d0ffe78d44ba52166a3c8e3907b10c9f142732d456d01d62bcc112f3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD574a406946b1d90771ea8a2963dc3b662
SHA10db2ad1700727393080f5eebf89484f6beb717c5
SHA256516a4db735be51a278aa30bad85b010f768098c9a336c8331f0d4bb6e65497c4
SHA512a59f2c773f5c64d2183f2a2eb8d466bd9d80f8cff4174981c51359367ea01479bcd5f1039c26443e89db3416050b8fb7c2e107732d2f660c05ccd89394b1eba5