Redline — CyberDefenders Walkthrough

A memory forensics investigation using Volatility and Strings to trace an attacker who bypassed NIDS, identify the malware family, and uncover every footprint left behind.

Category: Endpoint Forensics

Tactics: Privilege Escalation, Defense Evasion, Command and Control

Tools: Volatility, Strings


Scenario

As a member of the Security Blue team, your assignment is to analyze a memory dump using Redline and Volatility tools. Your goal is to trace the steps taken by the attacker on the compromised machine and determine how they managed to bypass the Network Intrusion Detection System (NIDS). Your investigation will identify the specific malware family employed in the attack and its characteristics. Additionally, your task is to identify and mitigate any traces or footprints left by the attacker.


Q1 — What is the name of the suspicious process?

Initially I checked the wire to gain a better understanding of the network connections to better filter out the processes and the distinct IP stood out.

python3 vol.py -f MemoryDump.mem windows.netscan

Answer: oneetx.exe

netscan output revealing suspicious process with distinct IP


Q2 — What is the child process name of the suspicious process?

This led me into using windows.pslist along with grep to filter down and find the suspicious process and its child process.

python3 vol.py -f MemoryDump.mem windows.pslist | grep "5896"

Answer: rundll32.exe

pslist filtered output showing child process rundll32.exe


Q3 — What is the memory protection applied to the suspicious process memory region?

I used windows.vadinfo on the PID of our suspicious process oneetx.exe.

python3 vol.py -f MemoryDump.mem windows.vadinfo --pid 5896

Answer: PAGE_EXECUTE_READWRITE

vadinfo output showing memory protection flags


Q4 — What is the name of the process responsible for the VPN connection?

This one was tricky. The IP associated with tun2socks.exe wasn’t flagged as malicious on VirusTotal. I had no idea it was responsible for VPN connections at first. Some research indicated it was the process that needed deeper investigation, which prompted me to run windows.pstree to find the answer.

python3 vol.py -f MemoryDump.mem windows.pstree --pid 4628

Answer: outline.exe

pstree output identifying outline.exe as the VPN process

VirusTotal lookup on tun2socks.exe IP confirming VPN usage


Q5 — What is the attacker’s IP address?

This one was straightforward. I looked up the distinct IP from Q1 in VirusTotal and confirmed it was flagged as malicious across multiple vendors.

Answer: 77.91.124.20

VirusTotal confirming attacker IP flagged across multiple vendors


Q6 — What is the full URL of the PHP file that the attacker visited?

I used strings to extract URLs from the memory dump, then piped through grep with the malicious IP to narrow it down.

strings MemoryDump.mem | grep 77.91.124.20

Answer: http://77.91.124.20/store/games/index.php

strings output showing full PHP URL visited by attacker


Q7 — What is the full path of the malicious executable?

To find the full path I used windows.filescan and filtered the output with grep.

python3 vol.py -f MemoryDump.mem windows.filescan | grep "oneetx.exe"

Answer: C:\Users\Tammam\AppData\Local\Temp\c3912af058\oneetx.exe

filescan output revealing full path of malicious executable