Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

WarmCookie

160
Global rank
141 infographic chevron month
Month rank
125 infographic chevron week
Week rank
0
IOCs

WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.

Backdoor
Type
Unknown
Origin
1 April, 2024
First seen
18 November, 2025
Last seen
Also known as
Badspace

How to analyze WarmCookie with ANY.RUN

Type
Unknown
Origin
1 April, 2024
First seen
18 November, 2025
Last seen

IOCs

IP addresses
93.152.230.29
185.49.70.76
87.120.126.32
185.161.251.26
62.60.238.115
195.82.147.3
91.222.173.91
194.87.45.138
45.153.126.129
87.120.93.151
109.120.137.42
38.180.91.117
155.94.155.155
91.222.173.219
185.49.68.139
185.195.64.68
89.46.232.52
194.71.107.41
89.46.232.247
185.49.69.102
Domains
obez.ru
quiz.probiju.ru
vobraze.ru
storsvc-win.com
job-search.hays-findjobs.top
com.find-jobs.search-directly.top
com.page-executive.employment-agency.top
employment-agency.top
job-search.executive-search.top
com.job-search.hays-findjobs.top
job-search.top-mp.top
assets.work-for.top
hays-findjobs.top
com.for-job-seekers.work-for.top
com.job-search.executive-search.top
michaelpage.com.job-search.executive-search.top
com.job-search.top-mp.top
michaelpage.com.job-search.hays-findjobs.top
michaelpage.com.job-search.top-mp.top
find-jobs.search-directly.top
Last Seen at
Last Seen at

Recent blog posts

post image
Detected in 60 Seconds: How to Identify Phish...
watchers 452
comments 0
post image
LOLBin Attacks Explained with Examples: Every...
watchers 2268
comments 0
post image
Healthcare MSSP Cuts Phishing Triage by 76% a...
watchers 487
comments 0

What is Warmcookie malware?

WarmCookie, also referred to as BadSpace, is a two-stage backdoor malware that allows cybercriminals to gather victim information and deploy additional payloads. It is suspected to have been developed by an unidentified group of cybercriminals who are proficient in deploying sophisticated phishing campaigns.

The Warmcookie malware is mostly spread through phishing campaigns, as noted by various open-source intelligence (OSINT) sources. These emails often use job recruitment lures, making them appear legitimate and increasing the likelihood that recipients will open them.

As a two-stage backdoor malware, Warmcookie operates in 2 phases:

  • Initial stage: The first phase involves infecting the system and establishing an initial foothold. This stage is typically designed to be small and stealthy to avoid detection.
  • Secondary stage: After the initial infection, the second stage is activated. This phase offers more advanced capabilities, such as extensive data theft, deeper system infiltration, and the deployment of further malicious payloads.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Warmcookie malware technical details

The primary functionality of Warmcookie is to provide unauthorized remote access to compromised systems, allowing attackers to control the infected devices, exfiltrate sensitive data, and deploy additional malicious software.

Some of the key capabilities of Warmcookie include:

  • Allowing attackers to execute commands remotely on the infected system, giving them full control over the device.
  • Capturing and sending sensitive information, such as login credentials, financial data, and personal files, to the command and control (C2) server.
  • Downloading and executing additional malware, making it a versatile tool for multi-stage attacks.
  • Modifying system registries, creating scheduled tasks, and storing its DLL in inconspicuous locations for long-term access.
  • Establishing encrypted communication with its C2 server to receive instructions and exfiltrate data, making its traffic harder to detect and intercept by security tools.

Warmcookie execution process

To see how Warmcookie operates, let’s upload its sample to the ANY.RUN sandbox.

The infection begins when the victims receive phishing emails that appear to be personalized with their name and current employer, presenting a fake job offer. These emails contain a link, purportedly to an internal recruitment platform, which redirects the user to a landing page mimicking a legitimate recruitment site.

Warmcookie graph in ANY.RUN Warmcookie process graph in shown ANY.RUN sandbox

The fake landing page may prompt the victim to solve a CAPTCHA, making the site seem more legitimate before prompting the download of a heavily obfuscated JavaScript file named something like "JobOffer_Adecco_062024_XWYGQJOFSUQ.pdf.js." The double extension is designed to deceive users into believing it is a harmless PDF file rather than a dangerous JavaScript file.

Warmcookie report in ANY.RUN Warmcookie threat report generated by ANY.RUN

Once downloaded, the obfuscated JavaScript file executes a PowerShell script that uses Windows system utilities and services, such as BITS, to download the Warmcookie DLL from a specified URL and execute it via rundll32.exe.

To view logs of the script's execution, users can open the “Advanced details of the process” and navigate to the Script Tracer.

Warmcookie script in ANY.RUN Warmcookie script execution logs analysis in ANY.RUN

The Warmcookie DLL is then copied to “C:\ProgramData\RtlCpl\RtlCpl.dll,” and a scheduled task named "RtlCpl" is created to run it.

Warmcookie establishes communication with its command and control server and begins fingerprinting the victim's machine, collecting system information such as IP address, CPU details, volume serial number, DNS domain, computer name, and username. The malware can also capture screenshots, enumerate installed programs, execute arbitrary commands, drop files, and read file contents to send to the C2 server.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Warmcookie distribution methods

Similar to other malware like AgentTesla and Remcos, Warmcookie malware is typically delivered through social engineering techniques designed to trick victims into executing malicious software. The main delivery methods include:

  • Phishing emails: Emails pretending to be from recruiters or offering job opportunities, often with attachments or links that download the malware when clicked.
  • Malicious attachments: Word documents, PDFs, or Excel files that exploit software vulnerabilities to execute the malware when opened.
  • Malicious links: Links embedded in emails that direct victims to download the malware from compromised or malicious websites.

Conclusion

Warmcookie malware poses a significant threat due to its ability to provide remote control to attackers, steal sensitive data, deploy additional malicious payload, and maintain persistent access on compromised systems.

ANY.RUN is a cloud-based service that allows safe analysis of suspicious files and URLs, including Warmcookie malware. It enables anyone to observe malware behavior and collect indicators of compromise in a secure environment. With the help of ANY.RUN, you can easily understand Warmcookie's tactics to develop proper strategies for defending against it.

Sign up for ANY.RUN today - it's free!

HAVE A LOOK AT

Bert Ransomware screenshot
Bert Ransomware is a newly emerged ransomware group that has been active since April 2025. It deploys variants targeting both Windows and Linux systems, focusing on critical sectors like healthcare, technology, and event services across the US, Asia, and Europe.
Read More
DarkGate screenshot
DarkGate
darkgate
DarkGate is a loader, which possesses extensive functionality, ranging from keylogging to crypto mining. Written in Delphi, this malware is known for the use of AutoIT scripts in its infection process. Thanks to this malicious software’s versatile architecture, it is widely used by established threat actors.
Read More
Razr screenshot
Razr
razr
Razr is a destructive ransomware that infiltrates systems to encrypt files, rendering them inaccessible to users. It appends the ".razr" extension to the encrypted files and drops a ransom note, typically named "README.txt," instructing victims on how to pay the ransom to obtain the decryption key. The malware often spreads through phishing emails with malicious attachments or by exploiting vulnerabilities in software and operating systems. Razr employs strong encryption algorithms, making it challenging to decrypt files without the attackers' key.
Read More
Emmenhtal screenshot
Emmenhtal
emmenhtal
First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments.
Read More
Salty 2FA screenshot
Salty 2FA
salty2fa
Salty 2FA is a sophisticated Phishing-as-a-Service (PhaaS) framework tailored to hijack user sessions, steal credentials, and gain unauthorized access to corporate systems. Delivered primarily via targeted emails, this kit employs multi-stage evasion tactics, making it a stealthy tool for cybercriminals aiming at high-value enterprise accounts.
Read More
Sliver screenshot
Sliver
sliver
Sliver is an open-source command-and-control (C2) framework that has been increasingly adopted by threat actors as an alternative to tools like Cobalt Strike. Developed by security firm Bishop Fox, Sliver was initially intended for legitimate security testing and red teaming exercises. However, its robust features and open-source nature have made it attractive to malicious actors seeking to control compromised systems.
Read More