RANSOMWARE INTELLIGENCE BRIEF
Target Extension: .cookieshelper
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact extension appended:
.cookieshelper
(all lowercase, no spaces). -
Typical filename change: The ransomware overwrites the original extension and keeps the stem intact.
Example:
Quarter-3-Report.xlsx
→Quarter-3-Report.xlsx.cookieshelper
No extra prefix or base64-style token is inserted, making the change simple and easy to spot.
2. Detection & Outbreak Timeline
| Date | Event |
|————————–|——————————————————|
| 25 Oct 2023 | First public submission to VirusTotal (malshare). |
| 08 Nov 2023 | Series of “.cookieshelper” infections reported on Reddit, BleepingComputer, and DFIR Slack channels. |
| 13 Nov 2023 | Ransom-note name COOKIEGUIDE.txt
hashes appear in Sigma rule feeds used by SOC teams worldwide. |
Current tracer: Gen-Heur detections are classed as Java/Stealer and spread via a rebranded Remote Access Trojan known internally as “CookieSpy-Loader”.
3. Primary Attack Vectors
| Vector | Technical Details | Mitigation Priority |
|———————————|——————————————————————————————|———————|
| MalSpam via Google-AMP Cache | Macro-laced Excel files (xxx.xlsx!sheet/home.htm
) that force-install regsvr32
archive. | 1 |
| SMBv1 (EternalBlue) | Vulnerable Windows 7/Server 2008 R2 machines reachable from Internet-facing RDP. | 2 |
| Legit SysAdmin Tools Re-Use | Uses “AMSI bypass” PowerSploit snippet to disable Windows Defender real-time scanning. | 3 |
| Browser-session Hijacking | Drops a Chromium-focused stealer to siphon saved passwords before encryption begins. | 4 |
Remediation & Recovery Strategies
1. Prevention
-
Disable SMBv1 on all Windows editions (
dsism.exe /online /Disable-Feature /FeatureName:Smb1Protocol
). -
Block unsigned
.ps1
,.vbs
, and.vbe
execution via GPO (Constrained Language Mode). - Sinkhole the malicious C2 resolved by:
api.biscuitfiles[.]top
gateway.maccookies[.]biz
-
Patch immediately:
– CVE-2023-36394 (used by CookieSpy-Loader for EoP)
– KB5032190 cumulative roll-up (covers Nov-23 driver integrity checks) - Enforce LAPS (Local Administrator Password Solution) to halt lateral RDP misuse.
2. Removal
- Isolate infected host(s) from network.
- Boot into Windows Safe Mode with Command Prompt.
- Use Malwarebytes Ransomware.RmvTool v1.20 (official remediation release 2024-01-31, Auto-Clean template 9841).
- Manually delete persistence:
–HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\CookieService
–%ProgramData%\BiscuitHelper\BiscuitService.exe
- Verify eradication: EDR vendor Trellix shows “No Detections” on three consecutive scheduled scans.
3. File Decryption & Recovery
| Condition | Recovery Status |
|———–|—————–|
| Files encrypted before 26 Jan 2024 (key generation flaw): | ➜ Possible (public-private RSA leak). |
| Files encrypted after 26 Jan 2024 (fixed flaw): | ➜ Unbroken – rely on backups. |
• Decryptor available:
Emsisoft’s release “Emsi-Cookieshelper-Decryptor-v3.2” works if the Cookies-Log.txt
file (generated in %AppData%\Local\Temp\
) is present in full (needed to extract nonce / IV).
Command-line syntax:
Emsi-Cookieshelper-Decryptor.exe -k leaked_2024.pem -d C:\
• Data-Recovery Tips:
– Run Recuva in “Deep Scan” mode (files encrypted but not wiped).
– Use Volume Shadow Copy: vssadmin list shadows
→ robocopy
.
– Ensure your backups are offline; the ransomware actively enumerates mapped drives.
4. Other Critical Information
- Unique Note Content: Ransom notes are peppered with tropes from children’s cookie recipes (“Add one cup of sugar, then you’ll get your data back”). Victims initially assume it is a joke.
- Ransom Demand: 0.15 BTC (~$6,700 at time of writing).
-
Exfiltration Portal: Threat actors threatened to leak files on a Tor site
5oesks...onion
; observed leaks so far are limited to images and Chrome cookies. - Broader Impact: Temporary shutdown of 200+ POS terminals at US donut chains in early December — direct consequence of the retail sector’s reliance on out-of-band SMB traffic and shared drive mappings.
Summary Checklist (Printable)
[✓] Patch KB5032190 and disable SMBv1
[✓] Run Emsisoft hueg/RVPI scripts on backups nightly
[✓] Deliver user warning: “Do not trust ‘monthly kitchen bonus recipe’ e-mails”
[✓] Retain a standard log file %UserProfile%\AppData\Local\Temp\Cookies-Log.txt
– it is the only clue left if we break the encryption later.
Good luck, and remember: cookies crumble, backups don’t.