Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

WarmCookie

152
Global rank
130 infographic chevron month
Month rank
146 infographic chevron week
Week rank
0
IOCs

WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.

Backdoor
Type
Unknown
Origin
1 April, 2024
First seen
10 December, 2025
Last seen
Also known as
Badspace

How to analyze WarmCookie with ANY.RUN

Type
Unknown
Origin
1 April, 2024
First seen
10 December, 2025
Last seen

IOCs

IP addresses
93.152.230.29
185.49.70.76
87.120.126.32
185.161.251.26
62.60.238.115
195.82.147.3
91.222.173.91
194.87.45.138
45.153.126.129
87.120.93.151
109.120.137.42
38.180.91.117
155.94.155.155
91.222.173.219
185.49.68.139
185.195.64.68
89.46.232.52
194.71.107.41
89.46.232.247
185.49.69.102
Domains
obez.ru
quiz.probiju.ru
vobraze.ru
storsvc-win.com
job-search.hays-findjobs.top
com.find-jobs.search-directly.top
com.page-executive.employment-agency.top
employment-agency.top
job-search.executive-search.top
com.job-search.hays-findjobs.top
job-search.top-mp.top
assets.work-for.top
hays-findjobs.top
com.for-job-seekers.work-for.top
com.job-search.executive-search.top
michaelpage.com.job-search.executive-search.top
com.job-search.top-mp.top
michaelpage.com.job-search.hays-findjobs.top
michaelpage.com.job-search.top-mp.top
find-jobs.search-directly.top
Last Seen at
Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 2197
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 468
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 479
comments 0

What is Warmcookie malware?

WarmCookie, also referred to as BadSpace, is a two-stage backdoor malware that allows cybercriminals to gather victim information and deploy additional payloads. It is suspected to have been developed by an unidentified group of cybercriminals who are proficient in deploying sophisticated phishing campaigns.

The Warmcookie malware is mostly spread through phishing campaigns, as noted by various open-source intelligence (OSINT) sources. These emails often use job recruitment lures, making them appear legitimate and increasing the likelihood that recipients will open them.

As a two-stage backdoor malware, Warmcookie operates in 2 phases:

  • Initial stage: The first phase involves infecting the system and establishing an initial foothold. This stage is typically designed to be small and stealthy to avoid detection.
  • Secondary stage: After the initial infection, the second stage is activated. This phase offers more advanced capabilities, such as extensive data theft, deeper system infiltration, and the deployment of further malicious payloads.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Warmcookie malware technical details

The primary functionality of Warmcookie is to provide unauthorized remote access to compromised systems, allowing attackers to control the infected devices, exfiltrate sensitive data, and deploy additional malicious software.

Some of the key capabilities of Warmcookie include:

  • Allowing attackers to execute commands remotely on the infected system, giving them full control over the device.
  • Capturing and sending sensitive information, such as login credentials, financial data, and personal files, to the command and control (C2) server.
  • Downloading and executing additional malware, making it a versatile tool for multi-stage attacks.
  • Modifying system registries, creating scheduled tasks, and storing its DLL in inconspicuous locations for long-term access.
  • Establishing encrypted communication with its C2 server to receive instructions and exfiltrate data, making its traffic harder to detect and intercept by security tools.

Warmcookie execution process

To see how Warmcookie operates, let’s upload its sample to the ANY.RUN sandbox.

The infection begins when the victims receive phishing emails that appear to be personalized with their name and current employer, presenting a fake job offer. These emails contain a link, purportedly to an internal recruitment platform, which redirects the user to a landing page mimicking a legitimate recruitment site.

Warmcookie graph in ANY.RUN Warmcookie process graph in shown ANY.RUN sandbox

The fake landing page may prompt the victim to solve a CAPTCHA, making the site seem more legitimate before prompting the download of a heavily obfuscated JavaScript file named something like "JobOffer_Adecco_062024_XWYGQJOFSUQ.pdf.js." The double extension is designed to deceive users into believing it is a harmless PDF file rather than a dangerous JavaScript file.

Warmcookie report in ANY.RUN Warmcookie threat report generated by ANY.RUN

Once downloaded, the obfuscated JavaScript file executes a PowerShell script that uses Windows system utilities and services, such as BITS, to download the Warmcookie DLL from a specified URL and execute it via rundll32.exe.

To view logs of the script's execution, users can open the “Advanced details of the process” and navigate to the Script Tracer.

Warmcookie script in ANY.RUN Warmcookie script execution logs analysis in ANY.RUN

The Warmcookie DLL is then copied to “C:\ProgramData\RtlCpl\RtlCpl.dll,” and a scheduled task named "RtlCpl" is created to run it.

Warmcookie establishes communication with its command and control server and begins fingerprinting the victim's machine, collecting system information such as IP address, CPU details, volume serial number, DNS domain, computer name, and username. The malware can also capture screenshots, enumerate installed programs, execute arbitrary commands, drop files, and read file contents to send to the C2 server.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Warmcookie distribution methods

Similar to other malware like AgentTesla and Remcos, Warmcookie malware is typically delivered through social engineering techniques designed to trick victims into executing malicious software. The main delivery methods include:

  • Phishing emails: Emails pretending to be from recruiters or offering job opportunities, often with attachments or links that download the malware when clicked.
  • Malicious attachments: Word documents, PDFs, or Excel files that exploit software vulnerabilities to execute the malware when opened.
  • Malicious links: Links embedded in emails that direct victims to download the malware from compromised or malicious websites.

Conclusion

Warmcookie malware poses a significant threat due to its ability to provide remote control to attackers, steal sensitive data, deploy additional malicious payload, and maintain persistent access on compromised systems.

ANY.RUN is a cloud-based service that allows safe analysis of suspicious files and URLs, including Warmcookie malware. It enables anyone to observe malware behavior and collect indicators of compromise in a secure environment. With the help of ANY.RUN, you can easily understand Warmcookie's tactics to develop proper strategies for defending against it.

Sign up for ANY.RUN today - it's free!

HAVE A LOOK AT

Ransomware screenshot
Ransomware
ransomware
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Read More
RondoDox screenshot
RondoDox
rondodox
RondoDox is an emerging Linux-based botnet malware that exploits dozens of known vulnerabilities in internet-facing devices like routers, DVRs, and web servers to build massive networks for DDoS attacks, cryptomining, and data exfiltration. First spotted in mid-2025, its "exploit shotgun" tactic (firing multiple payloads at once) has made it a rapid escalator in the IoT threat landscape, compromising unpatched edge devices worldwide.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
WannaCry screenshot
WannaCry
wannacry ransomware
WannaCry is a famous Ransomware that utilizes the EternalBlue exploit. This malware is known for infecting at least 200,000 computers worldwide and it continues to be an active and dangerous threat.
Read More