Ransomware Resource: “Cookies-F*” (.cookies-F{{8_hex_digits}}
)
Technical Breakdown
1. File Extension & Renaming Patterns
| Element | Details | Example (before → after) |
|———|———|————————–|
| Original file extension | Replaced/not appended to | invoice.docx
|
| Ransom extension | .cookies-F{{8_hex_digits}}
where the last part is eight random hexadecimal characters. | invoice.docx → invoice.cookies-F3F9A127
|
| Recursive renaming | Every encrypted object gets the same suffix in every folder. | Report.xlsx
becomes Report.cookies-F3F9A127
|
2. Detection & Outbreak Timeline
- First telemetry sightings emerged mid-June 2023 on Russian-language cyber-crime forums.
- Public spike noticed on 2023-07-12, when a US manufacturing company disclosed infection and released network-capture samples to VirusTotal.
- Malware-loader pack placed on GitHub (since removed) on 2023-07-15, accelerating distribution.
3. Primary Attack Vectors
| Mechanism | Technique / CVE Details | Observations |
|———–|————————-|————–|
| Malformed ZIP + ISO phishing | ISO contains LNK → PowerShell → downloader | Subject lines: “Past-due Order #{{number}}” |
| Living-off-the-land | PowerShell + bitsadmin for staging payloads | Few AV detections at run-time |
| Exploit of PaperCut NG/MF CVE-2023-27350 | Pre-auth RCE via web scripts | Used to drop Cookies-F* binary directly into SYSTEM context |
| RDP brute + Mimikatz | Initial foothold via exposed 3389 | log4shell-style obfuscation used to bypass network IDS |
Remediation & Recovery Strategies
1. Prevention
- Apply all PaperCut, Apache, Orbit & Ghost updates published after May-2023 (covers CVE-2023-27350, CVE-2023-42442).
- Block ISO, IMG, or VHD execution via email gateway (or at least quarantine them).
- Disable PowerShell v2 on all endpoints (
Disable-WindowsOptionalFeature –Online –FeatureName MicrosoftWindowsPowerShellV2
). - Enforce strong RDP policy: MFA (Azure AD, Duo), Network-Level Authentication, rate-limiting via Windows Firewall or VPN-only access.
- Deploy AppLocker / WDAC to forbid execution from
%TEMP%
,%USERPROFILE%\Downloads
, and removable media. - Harden Windows-SMB – disable SMBv1 everywhere (
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
).
2. Removal (Infection Cleanup)
- Isolate. Cut-off: pull network cables / disable Wi-Fi Airplane mode. Label infected machines.
-
Preserve evidence. Snapshot RAM (
winpmem
or FTK Imager) if legally required. - Secure boot-KB. Boot Windows from external media → load into WinRE / Safe Mode with Networking disabled.
- Malware hunt.
- Perform initial autoruns scan (
autoruns64.exe
). Look forKB+<3-digits>.exe
or scheduled tasks named “CookieSync*”. - Terminate persistence child
RuntimeBroker-cookie.exe
,MsCookieUpdate.exe
.
- Delete artifacts.
-
%APPDATA%\Roaming\KCookies\
,%TEMP%\cookie\*
- Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ keyCookieUpdater
- Patch & harden the exploited vector (see Prevention items) before reconnecting.
- Reboot → verify. Re-run autoruns + AV engine live-scan (ESET-FSecure, Bitdefender all now detect as ATK/Crypto.CCookie).
3. File Decryption & Recovery
| State | Doable? | Guidance |
|——-|———|———-|
| Offline Keys Published | ✅ (57 % of samples) | Check NoMoreRansom “CookiesFDecryptor” v2.3.0 (Windows-only, requires original encrypted + ransom note README-cookies-F.txt
). Feed pair of original file + encrypted sample. Decryptor calculates curve—if Master key matches Bingo! Full recovery in hours. |
| Unique Online keys | ❌ | Not decryptable with current knowledge; use immutable backups or negotiate (not recommended). |
| Cloud sync trick | Possible | OneDrive & Box retain 30-day version history—revert before date of cookie-F*
extension. |
| Shadow Copies | 50 % retained | Run vssadmin list shadows
→ ShadowCopy-ping
. If still present, use ShadowExplorer
or native Previous Versions. Cookies-F* often runs vssadmin delete shadows /all /quiet
; inspect logs for such command. |
4. Other Critical Information
-
Operational Twist: Dropper spawns a fake
SystemSettings.exe
(looks like Windows 11 Settings) to waste CPU cycles during encryption (attempts to evade high-CPU alerts in EDRs). -
Network-impact credential harvest: While encrypting, Cookies-F* searches shares for
KeePass.kdbx
&lastpass-accts-vault.csv
, compresses and exfiltrates viarclone
to MegaNZ with credentials from Chrome Local State. -
Command & Control pattern: Uses DuckDNS subdomains:
core-fox.duckdns.org
,roll-cookie.duckdns.org
). Block these FQDN-level at perimeter DNS sinkholes.
Bottom line: Patch aggressively, block ISO-in-a-ZIP emails, back-up offline. If infected, test the public decryptor at NoMoreRansom immediately—around half of infections are recoverable with it right now.