Cybersecurity researcher has uncovered a sophisticated Iran-linked spear-phishing campaign that exploited a compromised email account at Oman’s Ministry of Foreign Affairs (MFA) in Paris. The attackers used stolen diplomatic communications and malicious macros to deliver malware to governments and international organizations worldwide.
Diplomatic decoys with harmful macros
The attackers hijacked an official email account belonging to the Omani Foreign Ministry in Paris and sent messages that appeared to contain urgent updates on multi-factor authentication (MFA). Recipients – including embassies, consulates and international organizations – were urged to ”Enable content” to display supposedly legitimate Word documents.

These documents contained a VBA macro dropper that recreated a binary payload from three-digit number sequences in a hidden form field. When the document was opened, it started a four-part chain:
- Delay and anti-analysis: A nested loop routine called laylay ran thousands of iterations to delay analysis and block sandbox environments.
- Payload decoding: The function dddd interpreted triplets of numbers into ASCII characters and built an executable binary file.
- Silent release and execution: The decoded payload was written to
C:\Users\Public\Documents\ManagerProc.logand was run hidden via a Shell command. - Persistence and cleanup: Delays and simple error handling hid any errors and ensured that the process was completed quietly.
This macro-based supply chain combined numerical encoding and time delays to bypass both email filters and dynamic analysis tools.
.webp)
Global espionage under diplomatic cover
A forensic analysis revealed that 270 spear-phishing emails were sent from 104 compromised addresses within Oman’s MFA network. The campaign used NordVPN nodes in Jordan to mask its origin, and targeted six regions:
- Europe: 10 countries, 73 addresses
- Africa: 12 countries, 30 addresses
- Asia: 7 countries, 25 addresses
- Middle East: 7 countries, 20 addresses
- America: 11 countries, 35 addresses
- International organizations: 10 bodies, 12 addresses
Europe appeared to be the primary target, but African missions were also hit hard. Attacks were directed at several international organizations, including UN, UNICEF and the World Bank, which indicates an interest in strategic diplomacy and humanitarian networks.
The timing of the campaign coincided with sensitive regional negotiations, suggesting that the aim was to gather intelligence and influence diplomatic outcomes.
Evasion, reconnaissance and next steps
The executable file that was dropped – called sysProcUpdate – demonstrated high technical sophistication. It used custom exception handlers and section packing to make reverse engineering difficult.
When the malware was activated, it collected system data such as username, computer name, and administrative status. The information was encrypted and sent via HTTPS POST to a command and control server on https://screenai.online/Home/.
A beaconing loop ensured repeated connection attempts even in the event of network outages.
To maintain its foothold, sysProcUpdate replicated itself to C:\ProgramData\sysProcUpdate.exe and modified Windows registry entries under DNS cache parameters – a sign of possible lateral movement and preparation for future attacks.
Analysts believe that the campaign primarily focused on reconnaissance and network mapping ahead of more advanced intrusions.
Recommendations for limitation
To protect businesses against this type of targeted attacks, the following measures are recommended:
- Indicator blocking: Block communication to
screenai.onlineand isolate documents that match known hash values for sysProcUpdate. - Macro security: Ensure that Office installations have macros disabled by default and require digital signing for activation.
- Network monitoring: Review outbound POST traffic to unknown domains and correlate against user activity.
- Registry review: Regularly check DNS and TCP/IP registry keys for unauthorized changes.
- VPN analysis: Identify sudden spikes in VPN usage or exit nodes that deviate from normal patterns.
By combining strong email filtering, proactive network defenses, and user education, organizations can significantly reduce the risk of being affected by similar attacks. attacks.
Indicators of Compromise (IoCs)
| Type | Hash / Domain / URL | File / Resource Name |
|---|---|---|
| Domain | screenai[.]online | C2 domain |
| URL | https://screenai.online/Home/ | Main C2 path |
| DOC | b2c52fde1301a3624a9ceb995f2de4112d57fcbc6a4695799aec15af4fa0a122 | Online Seminar.FM.gov.om.dnr.doc |
| DOC | 1c16b271c0c4e277eb3d1a7795d4746ce80152f04827a4f3c5798aaf4d51f6a1 | 1c16b271c0c4e277eb3d1a7795d4746ce80152f04827a4f3c5798aaf4d51f6a1.doc |
| DOC | 2c92c7bf2d6574f9240032ec6adee738edddc2ba8d3207eb102eddf4ab963db0 | DPR for dredging in FreeSpan_16082025.2.doc |
| DOC | 80e9105233f9d93df753a43291c2ab1a010375357db9327f9fe40d184f078c6b | DPR for dredging in FreeSpan_16082025.2.doc |
| DOC | f0ba41ce46e566f83db1ba3fc762fd9b394d12a01a9cef4ac279135e4c1c67a9 | Seminar.MFA.gov.ct.tr-1.doc |
| DOC | 02ccc4271362b92a59e6851ac6d5d2c07182064a602906d7166fe2867cc662a5 | Unknown DOC file |
| Email (EML) | 05d8f686dcbb6078f91f49af779e4572ba1646a9c5629a1525e8499ab481dbf2 | EML2_d3ea22143ada4154bf5ea6077d7938f8.eml |
| Email (EML) | 03828aebefde47bca0fcf0684ecae18aedde035c85f9d39edd2b7a147a1146fa | EML1_b83e249519684cd2ac40ad5fcfee687d.eml |
| EXE | 76fa8dca768b64aefedd85f7d0a33c2693b94bdb55f40ced7830561e48e39c75 | sysProcUpdate.exe |
| EXE | 1883db6de22d98ed00f8719b11de5bf1d02fc206b89fedd6dd0df0e8d40c4c56 | sysProcUpdate.exe |
| EXE | 3ac8283916547c50501eed8e7c3a77f0ae8b009c7b72275be8726a5b6ae255e3 | sysProcUpdate.exe |
| EXE | 3d6f69cc0330b302ddf4701bbc956b8fca683d1c1b3146768dcbce4a1a3932ca | sysProcUpdate.exe |
| VBS script | 20e7b9dcf954660555d511a64a07996f6178f5819f8501611a521e19fbba74b0 | ThisDocument.cls |







