This post documents my notes for the Dream Job Sherlock scenario.

Scenario prompt: You are a junior threat intelligence analyst investigating Operation Dream Job and need to extract key intelligence points from ATT&CK and IOC analysis.


Answers and notes

  1. Who conducted Operation Dream Job?
    Lazarus Group

  2. When was this operation first observed?
    September 2019

  3. Two campaigns are associated with Operation Dream Job. One is Operation North Star; what is the other?
    Operation Interception

  4. Two system binaries were used for proxy execution. One was Regsvr32; what was the other?
    Rundll32

  5. What lateral movement technique did the adversary use?
    Internal Spearphishing

  6. What is the ATT&CK technique ID for that lateral movement technique?
    T1534

  7. What Remote Access Trojan did Lazarus use in Operation Dream Job?
    DRATzarus

  8. What technique did the malware use for execution?
    Native API

  9. What technique did the malware use to evade sandbox detection?
    Time Based Evasion

  10. Using VirusTotal with the provided IOCs, what name is associated with the first hash?
    IEXPLORE.exe

  11. When was the file associated with the second hash first created?
    2020-05-12 19:26:17

  12. What is the parent execution file associated with the second hash?
    BAE_HPC_SE.iso

  13. For the third hash, what likely campaign-aligned filename appears?
    Salary_Lockheed_Martin_job_opportunities_confidential.doc

  14. Which URL was contacted on 2022-08-03 by the file tied to the third hash?
    https://markettrendingcenter.com/lk_job_oppor.docx


Quick methodology

  • Reviewed MITRE ATT&CK entries related to Operation Dream Job and Lazarus activity.
  • Mapped behavior to execution, lateral movement, and evasion techniques.
  • Enriched IOC hashes in VirusTotal to extract filenames, parent artifacts, and contacted URLs.

Takeaways

  • Threat intel challenges are best solved by combining ATT&CK context with IOC enrichment.
  • Campaign naming overlaps can be confusing, so timeline and software mapping matters.
  • Parent-child execution artifacts in VirusTotal are often the fastest path to scenario answers.