Post

Dream Job-1 HackTheBox Sherlock Writeup

Sherlock Link: https://app.hackthebox.com/sherlocks/Dream%20Job-1/play

Dream Job-1 HackTheBox Sherlock Writeup

Sherlock Link: https://app.hackthebox.com/sherlocks/Dream%20Job-1/play


Dream Job-1 HackTheBox Sherlock Writeup

Sherlock Link: https://app.hackthebox.com/sherlocks/Dream%20Job-1/playimage

Sherlock Scenario

You are a junior threat intelligence analyst at a Cybersecurity firm. You have been tasked with investigating a Cyber espionage campaign known as Operation Dream Job. The goal is to gather crucial information about this operation.

Who conducted Operation Dream Job?

We can find this easily on the MITRE ATT&CK® page of the Operation Dream Job.image

Answer: Lazarus Group

When was this operation first observed?

On the same page, look at the First Seen.image

Answer: September 2019

There are 2 campaigns associated with Operation Dream Job. One is Operation North Star, what is the other?

We can find this under Associated Campaign Descriptions.image

Answer: Operation Interception

During Operation Dream Job, there were the two system binaries used for proxy execution. One was Regsvr32, what was the other?

Press Ctrl+F and search for proxy. Then we can find the two system binaries used for proxy execution.image

Answer: Rundll32

What lateral movement technique did the adversary use?

Go to the ATT&CK navigate layer, then look at the lateral movement column.image

Answer: Internal Spearphishing

What is the technique ID for the previous answer?

image

Answer: T1534

What Remote Access Trojan did the Lazarus Group use in Operation Dream Job?

Scroll down to Software, and then find the Remote Access Trojan.image

Answer: DRATzarus

What technique did the malware use for execution?

Let’s go to the ATT&CK navigate layer of the DRATzarus software and check under the execution column.image

Answer: Native API

What technique did the malware use to avoid detection in a sandbox?

Now, let’s look at the defense evasion techniques column. There are a few; we need to look for the virtualization part.image

Answer: Time Based Evasion

To answer the remaining questions, utilize VirusTotal and refer to the IOCs.txt file. What is the name associated with the first hash provided in the IOC file?

This is the result after searching the first hash in VirusTotal.image

Answer: IEXPLORE.exe

When was the file associated with the second hash in the IOC first created?

Search the second hash and under the detail tab, look under History.image

Answer: 2020–05–12 19:26:17

What is the name of the parent execution file associated with the second hash in the IOC?

Navigate to relations and look under the Execution Parents.image

Answer: BAE_HPC_SE.iso

Examine the third hash provided. What is the file name likely used in the campaign that aligns with the adversary’s known tactics?

Under the details->names, the file Salary_Lockheed_Martin_job_opportunities_confidential.doc looked convincing, as the victims of this campaign are job seekers.image

Answer: Salary_Lockheed_Martin_job_opportunities_confidential.doc

Which URL was contacted on 2022–08–03 by the file associated with the third hash in the IOC file?

In the Relations tab, look at the data 2022–08–03image

Answer: https://markettrendingcenter.com/lk_job_oppor.docx

Conclusion

This exercise provided a hands-on walk-through of threat hunting and cyber espionage analysis using real-world frameworks like MITRE ATT&CK and platforms like VirusTotal. It highlights the importance of IOC correlation, malware behavior analysis, and understanding adversary tactics to build threat intelligence.

Thank you for reading my write-up. I hope you found it helpful.

This post is licensed under CC BY 4.0 by the author.