Scenario

As a member of the Security Blue team, your assignment is to analyze a memory dump using Redline and Volatility tools. Your goal is to trace the steps taken by the attacker on the compromised machine and determine how they managed to bypass the Network Intrusion Detection System (NIDS). Your investigation will identify the specific malware family employed in the attack and its characteristics. Additionally, your task is to identify and mitigate any traces or footprints left by the attacker.

https://cyberdefenders.org/blueteam-ctf-challenges/redline/


1- What is the name of the suspicious process?

oneetx.exe

Screenshot 2025-09-01 044625.png

first we start by listing the processes using windows.pstree while examining the pstree output one standout oneetx.exe because of several factor like its name , and its located at local\\temp directory this path is a well known indicator of malicious activity and the parent process is svchost.exe which is a legitimate system process however it is not expected form svchost.exe to spawn custom executable from this paths

also we see in malfind plugin output that it is malicious

Screenshot 2025-09-01 234827.png

2- What is the child process name of the suspicious process?

rundll32.exe

Screenshot 2025-09-01 044740.png

can see it from the previous question screenshot

rundll32.exe is a legitimate windows utility but also a well known LOLBIN meaning its commonly abused by attackers for malicious purposes such as executing malicious payloads

3- What is the memory protection applied to the suspicious process memory region?