Analysis
-
max time kernel
134s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
Resource
win10v2004-20230220-en
General
-
Target
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
-
Size
1.2MB
-
MD5
72a0783fb5df123613abe131b77b4a90
-
SHA1
9d7faf18b2ae685a96699ec4d69a8da06add0cdc
-
SHA256
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805
-
SHA512
e1eb7e579a8c5f5588049d861801e05fbaded13fe9bc781054d0c782010e846c4bbf5f894244644a318e01611e90ce76ff2d4ee530b60787a587f5ecfb616015
-
SSDEEP
24576:CylKByM/D5GRUHyunHY3Kurx/HoBmtqUVHpBdSsMG8Gg/AXyuBzV:pg/DDyuHY6IPcmtHddMcgER
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z33888258.exez92563820.exez51087290.exes16598214.exe1.exet69575608.exepid process 1700 z33888258.exe 980 z92563820.exe 580 z51087290.exe 1516 s16598214.exe 1992 1.exe 268 t69575608.exe -
Loads dropped DLL 13 IoCs
Processes:
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exez33888258.exez92563820.exez51087290.exes16598214.exe1.exet69575608.exepid process 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe 1700 z33888258.exe 1700 z33888258.exe 980 z92563820.exe 980 z92563820.exe 580 z51087290.exe 580 z51087290.exe 580 z51087290.exe 1516 s16598214.exe 1516 s16598214.exe 1992 1.exe 580 z51087290.exe 268 t69575608.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z33888258.exez92563820.exez51087290.exeffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z33888258.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z92563820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z92563820.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z51087290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z51087290.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z33888258.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s16598214.exedescription pid process Token: SeDebugPrivilege 1516 s16598214.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exez33888258.exez92563820.exez51087290.exes16598214.exedescription pid process target process PID 1376 wrote to memory of 1700 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 1376 wrote to memory of 1700 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 1376 wrote to memory of 1700 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 1376 wrote to memory of 1700 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 1376 wrote to memory of 1700 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 1376 wrote to memory of 1700 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 1376 wrote to memory of 1700 1376 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 1700 wrote to memory of 980 1700 z33888258.exe z92563820.exe PID 1700 wrote to memory of 980 1700 z33888258.exe z92563820.exe PID 1700 wrote to memory of 980 1700 z33888258.exe z92563820.exe PID 1700 wrote to memory of 980 1700 z33888258.exe z92563820.exe PID 1700 wrote to memory of 980 1700 z33888258.exe z92563820.exe PID 1700 wrote to memory of 980 1700 z33888258.exe z92563820.exe PID 1700 wrote to memory of 980 1700 z33888258.exe z92563820.exe PID 980 wrote to memory of 580 980 z92563820.exe z51087290.exe PID 980 wrote to memory of 580 980 z92563820.exe z51087290.exe PID 980 wrote to memory of 580 980 z92563820.exe z51087290.exe PID 980 wrote to memory of 580 980 z92563820.exe z51087290.exe PID 980 wrote to memory of 580 980 z92563820.exe z51087290.exe PID 980 wrote to memory of 580 980 z92563820.exe z51087290.exe PID 980 wrote to memory of 580 980 z92563820.exe z51087290.exe PID 580 wrote to memory of 1516 580 z51087290.exe s16598214.exe PID 580 wrote to memory of 1516 580 z51087290.exe s16598214.exe PID 580 wrote to memory of 1516 580 z51087290.exe s16598214.exe PID 580 wrote to memory of 1516 580 z51087290.exe s16598214.exe PID 580 wrote to memory of 1516 580 z51087290.exe s16598214.exe PID 580 wrote to memory of 1516 580 z51087290.exe s16598214.exe PID 580 wrote to memory of 1516 580 z51087290.exe s16598214.exe PID 1516 wrote to memory of 1992 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 1992 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 1992 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 1992 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 1992 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 1992 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 1992 1516 s16598214.exe 1.exe PID 580 wrote to memory of 268 580 z51087290.exe t69575608.exe PID 580 wrote to memory of 268 580 z51087290.exe t69575608.exe PID 580 wrote to memory of 268 580 z51087290.exe t69575608.exe PID 580 wrote to memory of 268 580 z51087290.exe t69575608.exe PID 580 wrote to memory of 268 580 z51087290.exe t69575608.exe PID 580 wrote to memory of 268 580 z51087290.exe t69575608.exe PID 580 wrote to memory of 268 580 z51087290.exe t69575608.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe"C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:268
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5937913e7480f0b382cddfebdb88e7959
SHA173b492e81201375b01bd888d4c69105410c62d8b
SHA256653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366
SHA512d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51
-
Filesize
1.0MB
MD5937913e7480f0b382cddfebdb88e7959
SHA173b492e81201375b01bd888d4c69105410c62d8b
SHA256653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366
SHA512d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51
-
Filesize
759KB
MD5669972a7a9ccc2ee9cf30a6baa0c8f1d
SHA1fc5a9389c475772992d962fab642d1c08f5339d1
SHA2566826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531
SHA51288e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b
-
Filesize
759KB
MD5669972a7a9ccc2ee9cf30a6baa0c8f1d
SHA1fc5a9389c475772992d962fab642d1c08f5339d1
SHA2566826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531
SHA51288e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b
-
Filesize
577KB
MD5adad2848e7f4294d9b629fb831407b2a
SHA1145b169499a88e5e41680b39edcc90fc01be4ee5
SHA2560e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb
SHA5127a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022
-
Filesize
577KB
MD5adad2848e7f4294d9b629fb831407b2a
SHA1145b169499a88e5e41680b39edcc90fc01be4ee5
SHA2560e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb
SHA5127a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
169KB
MD59452bfe35eec088769d9a4b1cd452032
SHA1ffc4902e7f7118b776f2092456c136b29dcd168d
SHA25698287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830
SHA5123e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a
-
Filesize
169KB
MD59452bfe35eec088769d9a4b1cd452032
SHA1ffc4902e7f7118b776f2092456c136b29dcd168d
SHA25698287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830
SHA5123e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5937913e7480f0b382cddfebdb88e7959
SHA173b492e81201375b01bd888d4c69105410c62d8b
SHA256653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366
SHA512d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51
-
Filesize
1.0MB
MD5937913e7480f0b382cddfebdb88e7959
SHA173b492e81201375b01bd888d4c69105410c62d8b
SHA256653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366
SHA512d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51
-
Filesize
759KB
MD5669972a7a9ccc2ee9cf30a6baa0c8f1d
SHA1fc5a9389c475772992d962fab642d1c08f5339d1
SHA2566826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531
SHA51288e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b
-
Filesize
759KB
MD5669972a7a9ccc2ee9cf30a6baa0c8f1d
SHA1fc5a9389c475772992d962fab642d1c08f5339d1
SHA2566826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531
SHA51288e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b
-
Filesize
577KB
MD5adad2848e7f4294d9b629fb831407b2a
SHA1145b169499a88e5e41680b39edcc90fc01be4ee5
SHA2560e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb
SHA5127a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022
-
Filesize
577KB
MD5adad2848e7f4294d9b629fb831407b2a
SHA1145b169499a88e5e41680b39edcc90fc01be4ee5
SHA2560e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb
SHA5127a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
169KB
MD59452bfe35eec088769d9a4b1cd452032
SHA1ffc4902e7f7118b776f2092456c136b29dcd168d
SHA25698287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830
SHA5123e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a
-
Filesize
169KB
MD59452bfe35eec088769d9a4b1cd452032
SHA1ffc4902e7f7118b776f2092456c136b29dcd168d
SHA25698287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830
SHA5123e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf