Write-up: Horseman [Quals]

Category: Forensics
Files: horseman.ad1


1. Initial Analysis (Disk Inspection)

After analyzing the horseman.ad1 file, a suspicious executable named update.exe (Python-based) was discovered. From this analysis, we can answer 7 questions to complete this challenge.

image

2. Answering Challenge Questions

Q1. A suspicious executable was found in the Downloads folder. What is the SHA256 Hash of this malware?

image

Answer: aeb4cc771ae6f76b17ad1e8fb44d69cf5e5cea24adb23af03cae1dc7fd5e743c

Q2. The malware targets specific users by incorporating their unique system identifier into the encryption key. What is the SID (Security Identifier) of the infected user?

image

Answer: S-1-5-21-2472383311-4215914088-769331741

Q3. The malware leaves a trace of its initialization within the Windows Event Logs. What is the Event ID used by the malware to log its persistence entry?

image

Answer: 1337

Q4. Within the description of the event log identified in Question 3, the malware stores a unique “Reference ID” or token. What is the value of this Secret Token?

image

Answer: OOM9OV5VPRNIK3S2

Q5. To establish an incident timeline, determine the exact time the malware recorded its persistence log. What is the timestamp in UTC?

image

23.02.39 - 12.00.00

Answer: 2026-01-30 11:02:39

Q6. Based on the header analysis of the encrypted files and the malware’s logic, identify the encryption algorithm and mode used.

image

Answer: AES-CBC

Q7. DATA RECOVERY (FINAL)

The user reports losing a critical file named ‘confidential.txt’ in the Documents folder. Using your findings (SID + Token + IV), decrypt the file and reveal the secret string inside.

Encrypted file: (https://drive.google.com/file/d/1Ro-DZ8aiLq2XlOzScQVS0gAh64kKyOvE/view?usp=sharing)

image

Answer: b967081a1a071c25e2c4437e2e124b60b73407ec8eceb52e1eecc00caa1873ba