Technical Analysis & Remediation
MITRE ATT&CK Mapping
Initial Access
(T1566.001) Phishing: Spearphishing Attachment .
Execution
(T1204) Client Execution
(T1059) Command and Scripting Interpreter
Persistence
(T1053.005) Scheduled Task/Job - Task Name: "OneDriveHealth"
(T1546.015) Event Triggered Execution: Component Object Model Hijacking .
(T1102) Command and Control: Web Service: File/Data Transfer - Abuse of filen.io.
CVE Profile
ID
CVE-2026-21509
Status
Active Exploitation (Confirmed by CERT-UA).
Vector
Local exploitation via weaponized DOC files triggering remote code execution via WebDAV.
Live Evidence Extraction (IOCs)
"Anchor" Strings
Filename
"Consultation_Topics_Ukraine(Final).doc" *
Payloads
"EhStoreShell.dll"
"SplashScreen.png" (Shellcode container)
Persistence Task
"OneDriveHealth"
Network C2
"filen.io" (Legitimate service abuse)
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Blast Radius
Query SIEM for process execution involving EhStoreShell.dll or network connections to filen.io originating from Office binaries (WINWORD.EXE).
Network Isolation
Immediately block outbound WebDAV traffic and connections to filen.io at the perimeter firewall until the investigation is complete.
Tactical Hardening
Deploy Microsoft’s recommended registry-based mitigations for CVE-2026-21509 immediately, as patches may be delayed.
Phase 2: Eradication
Forensic Artifact Removal
Delete the scheduled task named "OneDriveHealth".
Scan for and remove the malicious artifacts: EhStoreShell.dll and SplashScreen.png.
Registry Cleaning
Audit and revert any unauthorized modifications to COM object registrations in the Windows Registry.
Phase 3: Recovery
Validation
Verify system integrity by monitoring for re-creation of the malicious scheduled task or unusual rundll32.exe activity.
Restoration
Re-image compromised endpoints if lateral movement (COVENANT framework usage) is suspected.
Phase 4: Lessons Learned
Detection Engineering
Implement SIGMA rules to detect Office applications spawning shells or creating scheduled tasks.
Governance
Review policy regarding the opening of unsolicited documents, specifically those utilizing "External" or "WebDAV" templates.
Remediation - THE HOME USER TRACK
Priority 1: Safety (Disconnection & Scanning)
Disconnect
Immediately disconnect the device from the internet (Wi-Fi/Ethernet) to sever the link to the attacker's C2 server.
Scan
Run a full offline scan using Microsoft Defender or a reputable AV solution. Specifically look for files named Consultation_Topics_Ukraine(Final).doc.
Priority 2: Persistence Removal
Task Check
Open "Task Scheduler" and look for a task named "OneDriveHealth". If found, right-click and Delete it immediately.
File Check
Search your drive for EhStoreShell.dll. If found outside of a trusted Windows directory (verify hash), delete it.
Priority 3: Identity
Credential Reset
Since the COVENANT framework implies post-exploitation control, assume credentials on the device are compromised. Reset passwords for email, banking, and social media from a clean device.
Hardening & References
Baseline
CIS Benchmark for Microsoft Office (Enable "Block all Office applications from creating child processes").
Framework
NIST SP 800-61r2 (Incident Handling Guide - Section 3.2.3: Interaction with Third Parties regarding C2 takedowns).
Reference
CERT-UA Alert regarding UAC-0001/APT28 activity.
Sources
Cyber Security News
External References & Technical Citations
CERT-UA