EhStorshell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
EhStorShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
EhStorShell.dll
Resource
win10v2004-20240426-en
General
-
Target
EhStorShell.dll
-
Size
185KB
-
MD5
846d0e4db261cfaf363902e41498e961
-
SHA1
6afbbd5d30c25dc05c66591c584da8e1da03b3f3
-
SHA256
d7e5591b7604fd583af7fda19e30928b24a6145318a3944e7d207f0cceeb30d0
-
SHA512
a870f84d13ec4f383db56ca5456f7ad4eb29ac67ae261fd2b92292c4f3ac421468907c85beced503beca611562334adf6ed1d4bfc14a0d90c85a073054cf3be0
-
SSDEEP
3072:Rj/sesKctIhKHBOcOHHekXUok/dCQXG3WxzfIThIwEEUd2fK:Rj/s9Kc7HBjOnVk4QWGV8IPEUIfK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource EhStorShell.dll
Files
-
EhStorShell.dll.dll regsvr32 windows:6 windows x86 arch:x86
60e0c50cee688d1e90460d9cacdacd18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_lock
_onexit
wcscpy_s
__dllonexit
_unlock
_errno
memmove_s
toupper
_vsnwprintf
memcpy
memset
??_U@YAPAXI@Z
??2@YAPAXI@Z
__CxxFrameHandler3
??_V@YAXPAX@Z
_purecall
wcsncpy_s
_CxxThrowException
memcpy_s
free
realloc
_except_handler4_common
??1type_info@@UAE@XZ
calloc
malloc
wcscat_s
_XcptFilter
_initterm
_amsg_exit
??3@YAXPAX@Z
kernel32
OutputDebugStringA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLastError
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
InterlockedIncrement
InterlockedDecrement
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
CompareStringW
GetDriveTypeW
GetLogicalDrives
LeaveCriticalSection
EnterCriticalSection
CompareStringOrdinal
DisableThreadLibraryCalls
SetThreadLocale
GetThreadLocale
GetVersionExA
InterlockedExchange
user32
InsertMenuW
SetMenuDefaultItem
LoadStringW
CharNextW
UnregisterClassA
ole32
StringFromGUID2
CoGetMalloc
CoCreateInstance
PropVariantClear
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysStringLen
VariantClear
SysAllocString
VariantInit
VarUI4FromStr
SysFreeString
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsExW
SetupDiDestroyDeviceInfoList
advapi32
TraceMessage
RegCloseKey
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
shell32
ord155
ord18
SHCreateDefaultExtractIcon
SHCreateItemFromIDList
SHGetIDListFromObject
propsys
PropVariantToString
PropVariantToVariant
PropVariantToStrRet
PSCreateMemoryPropertyStore
PSGetPropertyFromPropertyStorage
PropVariantCompareEx
InitVariantFromBuffer
shlwapi
SHStrDupW
ord176
ord199
ord219
ord158
comctl32
ord17
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ