Analysis
-
max time kernel
896s -
max time network
897s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2025, 17:14
Behavioral task
behavioral1
Sample
E88.30_CheckPointVPN.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
E88.30_CheckPointVPN.exe
Resource
win11-20250313-en
General
-
Target
E88.30_CheckPointVPN.exe
-
Size
61KB
-
MD5
c9e06f125bec06a184f50d82659104cc
-
SHA1
34e8ee115a12efbf6603e9b97bdccaf1e0c69403
-
SHA256
2bf8594ea21ca101000de7993a55ecdfa5ef34c96b020d87b634ad23a6594d3d
-
SHA512
d9afb386dfc79ae401c3e8015cd5fdf018bd7f6f5456ca01d5f2bec702fba546133fdcb279cf7aec1163fc108ddb134116f24b127271dfeefdf8da1388adbfe8
-
SSDEEP
1536:fiarTMDj7EDePNlRMK8yAiIysblda47pcIc6W:qwTMwD0Nl38kIjdaai
Malware Config
Extracted
warmcookie
89.46.232.52
-
mutex
fd3d0df6-f15b-49a5-a53a-276f51809bbd
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Executes dropped EXE 1 IoCs
pid Process 5236 Updater.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\V5S8LV0O.htm Updater.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Touchtap.job E88.30_CheckPointVPN.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Updater.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\E88.30_CheckPointVPN.exe"C:\Users\Admin\AppData\Local\Temp\E88.30_CheckPointVPN.exe"1⤵
- Drops file in Windows directory
PID:2876
-
C:\ProgramData\Touchtap\Updater.exeC:\ProgramData\Touchtap\Updater.exe /u1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:5236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5c9e06f125bec06a184f50d82659104cc
SHA134e8ee115a12efbf6603e9b97bdccaf1e0c69403
SHA2562bf8594ea21ca101000de7993a55ecdfa5ef34c96b020d87b634ad23a6594d3d
SHA512d9afb386dfc79ae401c3e8015cd5fdf018bd7f6f5456ca01d5f2bec702fba546133fdcb279cf7aec1163fc108ddb134116f24b127271dfeefdf8da1388adbfe8