QnQSec CTF 2025

This writeup documents my approach to solving two complex forensics challenges from QnQSec CTF 2025.

The challenges required a combination of:

Event Stats

Challenges Solved Questions Answered Tools Used Success Rate
2 8 10+ 100%

🚩 Challenges Solved

01. Masks

A comprehensive memory forensics challenge investigating a phishing incident. Analyze a memory dump to answer 8 questions tracing the complete attack chain from email delivery to persistence establishment.

02. Execution

A registry forensics challenge involving malicious command identification and malware analysis. Investigate a Living Off The Land (LOTL) attack using Windows bitsadmin.


🛠️ Tools & Technologies

Memory Forensics

Threat Intelligence

Analysis Utilities


🧠 MITRE ATT&CK Mapping

Initial Access Execution Persistence Defense Evasion C2
T1566 Phishing T1204 User Execution T1053 Scheduled Task T1197 BITS Jobs T1071 App Layer
Malicious Attachment T1059 Command Interp Registry Run Keys T1036 Masquerading HTTP/HTTPS C2

🧠 Key Takeaways

  1. AmCache is Critical: When direct file extraction fails, Windows AmCache provides hashes that can be cross-referenced with threat intelligence platforms.
  2. LOTL Techniques: Attackers increasingly abuse legitimate Windows utilities like bitsadmin to evade detection.
  3. Persistence Evolution: Modern attackers favor scheduled tasks over traditional registry Run keys.
  4. File Masquerading: Never trust file extensions — attackers disguise executables as images to bypass security filters.