Dream Job-1
![]() | |
Release Date | 06 Mar 2025 |
Retire Date | 06 Mar 2025 |
Difficulty | Very Easy |
Creator | ArthurWho |
What we gain?
- Threat Intelligence
- MITRE ATT&ACK
Scenario
You are a junior threat intelligence analyst at a Cybersecurity firm. You have been tasked with investigating a Cyber espionage campaign known as Operation Dream Job. The goal is to gather crucial information about this operation.
Provided artifacts
3 MD5 hashes in form of IOCs
- 7bb93be636b332d0a142ff11aedb5bf0ff56deabba3aa02520c85bd99258406f
- adce894e3ce69c9822da57196707c7a15acee11319ccc963b84d83c23c3ea802
- 0160375e19e606d06f672be6e43f70fa70093d2a30031affd2929a5c446d07c1
Task 1
Question: Who conducted Operation Dream Job?
By reading the sherlock info we can answer this question easily
Answer: Lazarus Group
Task 2
Question: When was this operation first observed?
just simple google dorking let us to the MITRE attack website and we can read more about the group and understand their TTPs. Under campaigns we can see “Operation Dream Job” and when it’s first seen

Answer: September 2019
Task 3
Question: There are 2 campaigns associated with Operation Dream Job. One is Operation North Star
, what is the other?
Just visiting the page can give us this answer

Answer: Operation Interception
Task 4
Question: During Operation Dream Job, there were the two system binaries used for proxy execution. One was Regsvr32
, what was the other?
We can read through various different TTPs methods used under this particular campaign and we see mention of those two binaries under T1218

Answer: Rundll32
Task 5
Question: What lateral movement technique did the adversary use?
Upon mapping on layer we can clearly see lateral movement techniques, which can also be found on the same campaign page too.

Answer: Internal Spearphishing
Task 6
Question: What is the technique ID for the previous answer?
On the same image we can see the technique ID.
Answer: T1534
Task 7
Question: What Remote Access Trojan did the Lazarus Group use in Operation Dream Job?
In the MITRE page scroll down to the Software section reveals with the answer.

Answer: DRATzarus
Task 8
Question: What technique did the malware use for execution?
Click on DRATzarus and go to its ATT&CK navigate layer. You will find the answer under the Execution Technique

Answer: Native API
Task 9
Question: What technique did the malware use to avoid detection in a sandbox?
Reading the techniques on the campaign page reveals us with sandbox bypass techniques

Answer: Time Based Evasion
Task 10
Question: To answer the remaining questions, utilize VirusTotal and refer to the IOCs.txt file. What is the name associated with the first hash provided in the IOC file?
For this we will copy the hash from the file and look it up on VirusTotal .
VirusTotal is an online service that analyzes files and URLs for potential threats by scanning them with multiple antivirus engines. It helps users quickly identify malware, phishing sites, and other malicious content.

Answer: IEXPLORE.EXE
Task 11
Question: When was the file associated with the second hash in the IOC first created?
Same process we will search the hash on virus total. Look in the Details tab in the history section we will find our answer.

Answer: 2020-05-12 19:26:17
Task 12
Question: What is the name of the parent execution file associated with the second hash in the IOC?
Again same process search the hash in VirusTotal, this time look in the Relations tab under the Execution Parent section we will find our answer.

Answer: BAE_HPC_SE.iso
Task 13
Question: Examine the third hash provided. What is the file name likely used in the campaign that aligns with the adversary’s known tactics?
We will find this answer in the Details tab under the Names section. As we know, the victims of this operation were job seekers so the most appropriate answer would be related to that.

Answer: Salary_Lockheed_Martin_job_opportunities_confidential.doc
Task 14
Question: Which URL was contacted on 2022-08-03 by the file associated with the third hash in the IOC file?
Again, utilizing VirusTotal we will find the answer in the Relations tab under Contacted URLs section.

Answer: https://markettrendingcenter.com/lk_job_oppor.docx
What’s next and connect?
Few more sherlock writeups by me and HTB CDSA exam blog! Feel free to check it out and below are couple of ways to conect me!