Home RedLine
Post
Cancel

RedLine

Learn how to use Redline to perform memory analysis and to scan for IOCs on an endpoint.

THM Room https://tryhackme.com/room/btredlinejoxr3d

TASK 1 : Introduction

Who created Redline?

Answer : FireEye

TASK 2 : Data Collection

What data collection method takes the least amount of time?

As we can read in the text : Standard Collector

Answer : Standard Collector

You are reading a research paper on a new strain of ransomware. You want to run the data collection on your computer based on the patterns provided, such as domains, hashes, IP addresses, filenames, etc. What method would you choose to run a granular data collection against the known indicators?

Answer : IOC Search Collector

What script would you run to initiate the data collection process? Please include the file extension.

RunRedlineAudit.bat RunRedlineAudit.bat

Answer : RunRedlineAudit.bat

If you want to collect the data on Disks and Volumes, under which option can you find it?

Redline Options Redline Options

Answer : disk enumeration

What cache does Windows use to maintain a preference for recently executed code?

As per User Guide https://www.fireeye.com/content/dam/fireeye-www/services/freeware/ug-redline.pdf and looking for “Cache” keyword :

Prefetch Cache Prefetch Cache

Answer : Prefetch

TASK 3 : The Redline Interface

Where in the Redline UI can you view information about the Logged in User?

system information system information

Answer : system information

TASK 4 : Standard Collector Analysis

Provide the Operating System detected for the workstation.

Operating System Operating System

Answer : Windows Server 2019 Standard 17763

Provide the BIOS Version for the workstation.

BIOS BIOS

Answer : Xen 4.2.amazon

What is the suspicious scheduled task that got created on the victim’s computer?

Scheduled Task Scheduled Task

Answer : MSOfficeUpdateFa.ke

Find the message that the intruder left for you in the task.

Full Detailed Information Full Detailed Information

Answer : THM-p3R5IStENCe-m3Chani$m

There is a new System Event ID created by an intruder with the source name “THM-Redline-User” and the Type “ERROR”. Find the Event ID #.

Go to event log then search source name in the filter :

Event Logs Event Logs

Answer : 546

Provide the message for the Event ID.

Event ID Message Event ID Message

Answer : Someone cracked my password. Now I need to rename my puppy-++-

It looks like the intruder downloaded a file containing the flag for Question 8. Provide the full URL of the website.

File Download History File Download History

Answer : https://wormhole.app/download-stream/gI9vQtChjyYAmZ8Ody0AuA

Provide the full path to where the file was downloaded to including the filename.

Answer : C:\Program Files (x86)\Windows Mail\SomeMailFolder\flag.txt

Provide the message the intruder left for you in the file.

Flag Flag

Answer : THM{600D-C@7cH-My-FR1EnD}

TASK 5 : IOC Search Collector

What is the actual filename of the Keylogger?

Keylogger Filename Keylogger Filename

Answer : psylog.exe

What filename is the file masquerading as?

Answer : THM1768.exe

Who is the owner of the file?

Answer : WIN-2DET5DP0NPT\charles

What is the file size in bytes?

Answer : 35400

Provide the full path of where the .ioc file was placed after the Redline analysis, include the .ioc filename as well

Full Path Full Path

Answer : c:\charles\Desktop\Keylogger-IOCSearch\IOCs\keylogger.ioc

TASK 6 : IOC Search Collector Analysis

Provide the path of the file that matched all the artifacts along with the filename.

Run the IOC you create on the session in C:\Users\Administrator\Documents\Analysis :

IOC Report IOC Report

Answer : C:\Users\Administrator\AppData\Local\Temp\8eJv8w2id6IqN85dfC.exe

Provide the path where the file is located without including the filename.

Answer : C:\Users\Administrator\AppData\Local\Temp

Who is the owner of the file?

Owner Owner

Answer : BUILTIN\Administrators

Provide the subsystem for the file.

Checked for “more info” :

Subsystem Subsystem

Then it gives you :

Passthehash Passthehash

Answer : Windows_CUI

Provide the Device Path where the file is located.

Answer : \Device\HarddiskVolume2

Provide the hash (SHA-256) for the file.

Copied the md5 (c590a84b8c72cf18f35ae166f815c9df) from the result and pasted it on Virustotal then go to detail tab to get the SHA256 result :

Virustotal Virustotal

Answer : 57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4

The attacker managed to masquerade the real filename. Can you find it having the hash in your arsenal?

Checinkg the others informations on Virustotal gives you the answer :

psexec.exe psexec.exe

Answer : psexec.exe

TASK 7 : Endpoint Investigation

Can you identify the product name of the machine?

Product name will be in the “system information” tab :

System Information System Information

Answer : Windows 7 Home Basic

Can you find the name of the note left on the Desktop for the “Charles”?

I searched through “file system” then “users\charles\desktop” :

Note filename Note filename

Answer : R_E_A_D__T_H_I_S__AJYG1O.txt

Find the Windows Defender service; what is the name of its service DLL?

Gone to “Windows services” then searched for “windef” name :

Windows Defender service Windows Defender service

Then double clicked on the “Windefend” service to view the properties :

Windefend Windefend

Answer : MpSvc.dll

The user manually downloaded a zip file from the web. Can you find the filename?

Looked into file system > download for Charles :

Zip downloaded Zip downloaded

Answer : eb5489216d4361f9e3650e6a6332f7ee21b0bc9f3f3a4018c69733949be1d481.zip

Provide the filename of the malicious executable that got dropped on the user’s Desktop.

Malicious executable Malicious executable

Answer : Endermanch@Cerber5.exe

Provide the MD5 hash for the dropped malicious executable.

Double clicked on this item :

Malicious executable hash Malicious executable hash

Answer : fe1bc60a95b2c2d77cd5d232296a7fa4

What is the name of the ransomware?

Name of the .exe file !

Answer : Cerber

TASK 8 : Conclusion

Read the above.

No Answer.

This post is licensed under CC BY 4.0 by the author.