Sherlock Scenario

You are a junior threat intelligence analyst at a Cybersecurity firm. You have been tasked with investigating a Cyber espionage campaign known as Operation Dream Job. The goal is to gather crucial information about this operation.

  1. Who conducted Operation Dream Job? Lazarus Group
  • Reviewed attack.mitre.org and searched for Operation Dream Job.
  1. When was this operation first observed? September 2019
  1. There are 2 campaigns associated with Operation Dream Job. One is Operation North Star, what is the other? Operation Interception
  1. During Operation Dream Job, there were the two system binaries used for proxy execution. One was Regsvr32, what was the other? Rundll32
  • Reading through the techniques used you will find two binary executions Regsvr32 and Rundll32.
  1. What lateral movement technique did the adversary use? Internal Spearphishing
  • In ATT&CK Navigator Layers open the view and under Lateral Movement you will see 9 techniques and Internal Spearphishing was used.
  1. What is the technique ID for the previous answer? T1534
  1. What Remote Access Trojan did the Lazarus Group use in Operation Dream Job? DRATzarus
  • Reading through the MITRE ATT&CK you find under software the tool used.
  1. What technique did the malware use for execution? Native API
  1. What technique did the malware use to avoid detection in a sandbox? Time Based Evasion
  1. To answer the remaining questions, utilize VirusTotal and refer to the IOCs.txt file. What is the name associated with the first hash provided in the IOC file? IEXPLORE.exe
  1. When was the file associated with the second hash in the IOC first created? 2020-05-12 19:26:17
  • In VirusTotal under the DETAILS section you will see the history of the file.
  1. What is the name of the parent execution file associated with the second hash in the IOC? BAE_HPC_SE.iso
  • In VirusTotal under the RELATIONS section you will find Execution Parents.
  1. Examine the third hash provided. What is the file name likely used in the campaign that aligns with the adversary’s known

tactics? Salary_Lockheed_Martin_job_opportunities_confidential.doc

After reviewing the has in VirusTotal you see under the DETAILS section the name of the file used.

  1. Which URL was contacted on 2022-08-03 by the file associated with the third hash in the IOC

**file? https://markettrendingcenter.com/lk_job_oppor.docx**

In VirusTotal under the RELATIONS section you will see the URL related to jobs which matches this attack.

Leave a Reply

Your email address will not be published. Required fields are marked *