A recent surge in attacks has seen a specially crafted Windows backdoor known as WarmCookie being used to infiltrate targeted systems, allowing attackers to then deliver ransomware and compromise the system. This backdoor, identified by researchers at Elastic Security Labs, has been widely distributed through phishing emails starting in late April by a campaign referred to as REF6127. The phishing emails utilized recruitment and job opportunities as bait to lure unsuspecting victims into clicking on malicious links, as revealed in a blog post by Elastic Security Labs.
Despite the simplicity of the malware itself, which primarily serves as an initial backdoor tool for reconnaissance and deploying additional malicious payloads, security experts caution against underestimating its impact. Daniel Stepanic, a principal security research engineer at Elastic Security, emphasized in the post that WarmCookie is actively being used and is affecting organizations on a global scale.
The code of the backdoor shares similarities with a previously reported sample by eSentire, hinting that WarmCookie may be an updated version of malware that has existed since 2022. However, the latest iteration of WarmCookie poses a more significant threat, with distinct functionalities and a broader reach, Stepanic pointed out.
Phishing emails leveraging job recruitment themes have been a common tactic among attackers, and the REF6127 campaign took it a step further by tailoring the lures to individual targets. By incorporating details about the victim’s current employer and offering enticing job descriptions, the attackers aimed to trick recipients into clicking on links that ultimately led to the deployment of WarmCookie.
The infection routine involves convincing targets to download a document by solving a CAPTCHA challenge on a landing page designed to emulate a legitimate internal system. Clicking on the link initiates the download of an obfuscated JavaScript file that runs PowerShell, kicking off the installation of WarmCookie. To evade detection, the malware continuously generates new landing pages on a specific IP address, targeting various recruiting firms with keywords related to job searching.
WarmCookie operates in two stages, serving as a lightweight backdoor that facilitates basic functions like gathering victim information and recording screenshots. The first stage involves setting up the backdoor to run with system privileges from the Task Scheduler Engine, ensuring continuous operation at regular intervals. The second stage encompasses the core functionalities of the backdoor, where the DLL is combined with the command line to execute specific actions.
To prevent detection and analysis, WarmCookie employs various tactics, such as encrypting strings using a custom decryption algorithm, dynamically loading APIs, and incorporating anti-analysis checks. The malware’s developers have taken precautions to obfuscate its code and make it challenging for security tools to identify and neutralize.
Elastic has issued a warning to organizations to remain vigilant against the evolving threat of WarmCookie, which is expected to undergo enhancements and add advanced functionalities over time. By providing YARA rules and insights into the behavior of the backdoor, Elastic aims to assist organizations in detecting and thwarting potential WarmCookie infections within their networks.
In conclusion, the emergence of the WarmCookie backdoor underscores the evolving landscape of cyber threats, urging organizations to adopt robust cybersecurity measures to defend against sophisticated attacks. As attackers continue to refine their tactics and tools, staying informed and proactive in cybersecurity defense strategies is essential to safeguarding sensitive data and maintaining operational integrity.

