Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
a8705e22444c6559c6b9467b81aa53d1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a8705e22444c6559c6b9467b81aa53d1_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a8705e22444c6559c6b9467b81aa53d1_JaffaCakes118.html
-
Size
175KB
-
MD5
a8705e22444c6559c6b9467b81aa53d1
-
SHA1
18284cc1914c92b6b7da94a74cea7176873f373a
-
SHA256
73da72697bd014f6ae64e84f299033797ce33628f3397137014df88e58e592a6
-
SHA512
b611d2b6b57b3c9976536d07d3a959216506d89d24a0dd8ccb809a154cf5b1f910904d69b6061d1691937f4eb3cb6fa8693616baeb0780278bb9ea2108f66510
-
SSDEEP
1536:Sqt58hd8Wu8pI8Cd8hd8dQg0H//3oS3wGNkFCYfBCJisI+aeTH+WK/Lf1/hmnVSV:SOoT3w/FTBCJium
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 3880 msedge.exe 3880 msedge.exe 5112 identity_helper.exe 5112 identity_helper.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3724 3880 msedge.exe 82 PID 3880 wrote to memory of 3724 3880 msedge.exe 82 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 3964 3880 msedge.exe 84 PID 3880 wrote to memory of 2108 3880 msedge.exe 85 PID 3880 wrote to memory of 2108 3880 msedge.exe 85 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86 PID 3880 wrote to memory of 908 3880 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8705e22444c6559c6b9467b81aa53d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedf6646f8,0x7ffedf664708,0x7ffedf6647182⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2308 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13084029413231650893,16906599036716263494,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD534b555fc01f798136412845ed9d4f822
SHA152eb6f4266fc75473066a3f946b89231eb22b771
SHA2568851d5ac21dcf73824c633fe13cb40cac82f3c1d9736ffd51e4c2b6aff2bc8ad
SHA512fca628da09c57e22df97db6c8e3d71fe5a970a86148e9cdbd830ff7796a378fc6c2ba78244ae94d1eb30f846ab98f1664b248c331a652ca3bfa3795f8e167993
-
Filesize
2KB
MD55a9668bb09ef5ae27d98ad537e51ded3
SHA15be66ae3464a18467ed895012ccad2986af47339
SHA2568bd45778d7a7c6d70fcc55ca8bf44ad0ba166dd16ce2b2a773b9b6ddebbb06a4
SHA51288edc163138497934ac89cc6db35c2ef9b14040e22b69d0cafb6c0996f36844b63ca8b322642617c6508546c927188d6b09a82f872135ea41801790281fef242
-
Filesize
2KB
MD5d706c869ef6a330a82197930d2b8bc47
SHA191358e7697fca621cc852133c8904edcea2b14e5
SHA256f99a0d47c70b2428675fb795f5fe34361a1b396a440aa2779501b5145301cd2e
SHA512681394e55597c9daf84582ce957cc910e25c1f398dc8d308532208cf83f945834cacdd569c99da253ff49ba652b3f5619df2891860e1ebca83f7eb550380d85f
-
Filesize
6KB
MD5ff66bad143a315632470dd2cc8de5130
SHA1d9dd2469dbcdf988a242ad754a4e634327ce698b
SHA25609a2d628b7531bdae90a909874402d9f30aaa9c6beb9f23a9dad34f7f3632274
SHA512b3e59fb9a146b9486371731b75a077e47e0f7e8fce319b536b7d89dae87af17b6af3ff1a791021a8e7612a1d1c4fde4eb2695de28d4228a2c4389b4d4d5275fe
-
Filesize
7KB
MD5b717bd0213c1b4d42d4656b2c049c604
SHA18d8a000d294d1b98e7213bd0c730f502acb564ff
SHA2563f148b52127da4498ad5cbb4aae0164ffc8ae400a4df616c8380e0c9198a331b
SHA512dcb178876afa5991feb357e66cb2eca5bb15490445bff9bbc8ff2edfcdd5404b356b8d4153fc547b6665ee1d6523d57ebbdde0ca2f72b16764be4ac45dd03963
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51ac63024710d1b80cec49e25dae0aac4
SHA1b994dabdb4be73ead391e028f93ae7f713fd07dc
SHA256b5481652351c53e2bc8cc0fb482e6c4d3ce7aee76744a3e1c1dace4d18418050
SHA5125136e9bb3f07a95e27136d1f4a02332f842f4b7e2ad347c3588212e1dd7f571d64913f0b703f60e16d29df822ce6cc7226307fd0dbe0e0772d3d461ae5e4a030