Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now

WarmCookie

124
Global rank
101 infographic chevron month
Month rank
99 infographic chevron week
Week rank
0
IOCs

WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.

Backdoor
Type
Unknown
Origin
1 April, 2024
First seen
20 January, 2025
Last seen
Also known as
Badspace

How to analyze WarmCookie with ANY.RUN

Type
Unknown
Origin
1 April, 2024
First seen
20 January, 2025
Last seen

IOCs

IP addresses
185.49.69.102
80.66.88.146
149.248.7.220
192.36.57.50
149.248.58.85
135.181.255.107
45.11.59.207
91.222.173.245
45.134.173.22
195.66.213.243
91.205.2.219
87.251.67.58
31.42.177.38
91.202.233.252
195.66.213.160
176.97.124.203
176.97.124.149
45.134.173.21
195.66.213.111
45.134.174.245
Domains
xaides.com
topsportracing.com
reports.checkfedexexp.com
mx1.info.tntseminars.com
windows.checkfedexexp.com
rrfqm.site
supports.checkfedexexp.com
appmin.checkfedexexp.com
adbs.info.ultimacomputers.com
duplified.com.co
branch1.checkfedexexp.com
mx1.info.ukshowroom.com
billing.checkfedexexp.com
mx1.info.toelicking.com
jianyun.com
dig-authentic.ipq.co
letjsnod.com
dedicated.vsys.host
savemo.shop
mx1.info.ultimacomputers.com
Last Seen at

Recent blog posts

post image
Malware Trends Overview Report: 2024
watchers 4958
comments 0
post image
YARA Rules: Cyber Threat Detection Tool for M...
watchers 680
comments 0
post image
Threat Intelligence Pivoting: Actionable Insi...
watchers 557
comments 0

What is Warmcookie malware?

WarmCookie, also referred to as BadSpace, is a two-stage backdoor malware that allows cybercriminals to gather victim information and deploy additional payloads. It is suspected to have been developed by an unidentified group of cybercriminals who are proficient in deploying sophisticated phishing campaigns.

The Warmcookie malware is mostly spread through phishing campaigns, as noted by various open-source intelligence (OSINT) sources. These emails often use job recruitment lures, making them appear legitimate and increasing the likelihood that recipients will open them.

As a two-stage backdoor malware, Warmcookie operates in 2 phases:

  • Initial stage: The first phase involves infecting the system and establishing an initial foothold. This stage is typically designed to be small and stealthy to avoid detection.
  • Secondary stage: After the initial infection, the second stage is activated. This phase offers more advanced capabilities, such as extensive data theft, deeper system infiltration, and the deployment of further malicious payloads.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Warmcookie malware technical details

The primary functionality of Warmcookie is to provide unauthorized remote access to compromised systems, allowing attackers to control the infected devices, exfiltrate sensitive data, and deploy additional malicious software.

Some of the key capabilities of Warmcookie include:

  • Allowing attackers to execute commands remotely on the infected system, giving them full control over the device.
  • Capturing and sending sensitive information, such as login credentials, financial data, and personal files, to the command and control (C2) server.
  • Downloading and executing additional malware, making it a versatile tool for multi-stage attacks.
  • Modifying system registries, creating scheduled tasks, and storing its DLL in inconspicuous locations for long-term access.
  • Establishing encrypted communication with its C2 server to receive instructions and exfiltrate data, making its traffic harder to detect and intercept by security tools.

Warmcookie execution process

To see how Warmcookie operates, let’s upload its sample to the ANY.RUN sandbox.

The infection begins when the victims receive phishing emails that appear to be personalized with their name and current employer, presenting a fake job offer. These emails contain a link, purportedly to an internal recruitment platform, which redirects the user to a landing page mimicking a legitimate recruitment site.

Warmcookie graph in ANY.RUN Warmcookie process graph in shown ANY.RUN sandbox

The fake landing page may prompt the victim to solve a CAPTCHA, making the site seem more legitimate before prompting the download of a heavily obfuscated JavaScript file named something like "JobOffer_Adecco_062024_XWYGQJOFSUQ.pdf.js." The double extension is designed to deceive users into believing it is a harmless PDF file rather than a dangerous JavaScript file.

Warmcookie report in ANY.RUN Warmcookie threat report generated by ANY.RUN

Once downloaded, the obfuscated JavaScript file executes a PowerShell script that uses Windows system utilities and services, such as BITS, to download the Warmcookie DLL from a specified URL and execute it via rundll32.exe.

To view logs of the script's execution, users can open the “Advanced details of the process” and navigate to the Script Tracer.

Warmcookie script in ANY.RUN Warmcookie script execution logs analysis in ANY.RUN

The Warmcookie DLL is then copied to “C:\ProgramData\RtlCpl\RtlCpl.dll,” and a scheduled task named "RtlCpl" is created to run it.

Warmcookie establishes communication with its command and control server and begins fingerprinting the victim's machine, collecting system information such as IP address, CPU details, volume serial number, DNS domain, computer name, and username. The malware can also capture screenshots, enumerate installed programs, execute arbitrary commands, drop files, and read file contents to send to the C2 server.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Warmcookie distribution methods

Similar to other malware like AgentTesla and Remcos, Warmcookie malware is typically delivered through social engineering techniques designed to trick victims into executing malicious software. The main delivery methods include:

  • Phishing emails: Emails pretending to be from recruiters or offering job opportunities, often with attachments or links that download the malware when clicked.
  • Malicious attachments: Word documents, PDFs, or Excel files that exploit software vulnerabilities to execute the malware when opened.
  • Malicious links: Links embedded in emails that direct victims to download the malware from compromised or malicious websites.

Conclusion

Warmcookie malware poses a significant threat due to its ability to provide remote control to attackers, steal sensitive data, deploy additional malicious payload, and maintain persistent access on compromised systems.

ANY.RUN is a cloud-based service that allows safe analysis of suspicious files and URLs, including Warmcookie malware. It enables anyone to observe malware behavior and collect indicators of compromise in a secure environment. With the help of ANY.RUN, you can easily understand Warmcookie's tactics to develop proper strategies for defending against it.

Sign up for ANY.RUN today - it's free!

HAVE A LOOK AT

Arechclient2 screenshot
Arechclient2
arechclient2
The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.
Read More
GootLoader screenshot
GootLoader
gootloader
GootLoader is an initial-access-as-a-service malware that operates by delivering the GootKit banking trojan and other malicious payloads. It utilizes techniques such as fileless execution and process injection to avoid detection. The malware is often distributed through SEO poisoning and compromised websites, deceiving users into downloading infected files.
Read More
Raspberry Robin screenshot
Raspberry Robin
raspberryrobin
Raspberry Robin is a trojan that primarily spreads through infected USB drives and exploits legitimate Windows commands. This malware is known for its advanced obfuscation techniques, anti-debugging mechanisms, and ability to gain persistence on infected systems. Raspberry Robin often communicates with command-and-control servers over the TOR network and can download additional malicious payloads.
Read More
Adware screenshot
Adware
adware
Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
WhiteSnake screenshot
WhiteSnake
whitesnake
WhiteSnake is a stealer with advanced remote access capabilities. The attackers using this malicious software can control infected computers and carry out different malicious activities, including stealing sensitive files and data, recording audio, and logging keystrokes. WhiteSnake is sold on underground forums and often spreads through phishing emails.
Read More