Potentially Unwanted Applications (PUAs) weaponized for covert delivery
A malware distribution campaign leveraging digitally signed binaries, deceptive packaging, and browser hijackers has been uncovered. The campaign centers around two malicious applications, ImageLooker.exe and Calendaromatic.exe, delivered via self-extracting 7-Zip archives. These artifacts align with the TamperedChef malware campaign, which uses trojanized productivity tools for initial access and data exfiltration. The malware employs NeutralinoJS framework, Unicode homoglyphs, and multiple digital signers to bypass detection. The campaign exploits user behavior through SEO poisoning and malvertising, masquerading as legitimate software. This sophisticated approach highlights the evolving tactics of threat actors in weaponizing PUAs and abusing digital code signing to evade security measures.
AI Analysis
Technical Summary
The threat involves a sophisticated malware distribution campaign leveraging Potentially Unwanted Applications (PUAs) that are weaponized for covert delivery. Central to this campaign are two malicious executables, ImageLooker.exe and Calendaromatic.exe, which are delivered via self-extracting 7-Zip archives. These binaries are digitally signed by multiple signers, a tactic used to bypass security detection mechanisms that often trust signed code. The campaign is attributed to the threat actor group known as TamperedChef, which is known for trojanizing productivity tools to gain initial access and conduct data exfiltration. The malware uses the NeutralinoJS framework, a lightweight application development framework, to facilitate its operations. It also employs Unicode homoglyphs—characters visually similar to legitimate ones—to deceive users and evade detection. The campaign exploits user behavior through SEO poisoning and malvertising, tricking victims into downloading what appears to be legitimate software. Additionally, the malware includes browser hijackers to manipulate victim browsing sessions. The attack chain involves multiple tactics and techniques such as code-signing abuse (T1553.002), command and scripting interpreter usage (T1059.007, T1059.001), data staging (T1074.001), persistence mechanisms (T1547.001), and credential dumping (T1003). The campaign’s complexity and use of deceptive packaging, digital signing, and social engineering highlight an evolution in threat actor tactics, weaponizing PUAs to evade traditional security controls and deliver malware covertly. Although no known exploits are currently observed in the wild, the presence of CVE-2025-0411 indicates a vulnerability leveraged by this campaign.
Potential Impact
For European organizations, this threat poses a significant risk due to its stealthy delivery and evasion techniques. The abuse of digital code signing undermines trust in signed binaries, potentially leading to widespread infection before detection. The use of trojanized productivity tools targets common enterprise software usage patterns, increasing the likelihood of successful initial access. Once inside, the malware can exfiltrate sensitive data, disrupt user browsing through hijacking, and establish persistence, complicating incident response. The SEO poisoning and malvertising components increase the attack surface by targeting users searching for legitimate software, potentially impacting a broad range of sectors including finance, healthcare, and government. The campaign’s ability to bypass detection mechanisms may result in prolonged dwell time, increasing the risk of data breaches and operational disruption. The medium severity rating reflects the balance between the complexity of exploitation and the potential for significant confidentiality and integrity impacts if successful.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this threat’s characteristics. Specifically: 1) Enforce strict application whitelisting that includes validation of digital signatures against known trusted signers and revocation lists to detect abuse of code signing. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to identify suspicious use of NeutralinoJS framework and anomalous scripting activities. 3) Enhance email and web filtering to block SEO poisoned links and malvertising domains, including proactive threat intelligence sharing to update blocklists with indicators such as the domain iolenaightdecipien.org and known malicious hashes. 4) Conduct user awareness training focused on recognizing deceptive packaging and the risks of downloading software from untrusted sources. 5) Monitor for persistence mechanisms and unusual process creations linked to trojanized productivity tools. 6) Implement network segmentation and data loss prevention (DLP) to limit data exfiltration capabilities. 7) Regularly audit and update digital certificate trust stores and promptly revoke certificates associated with malicious binaries. 8) Employ sandboxing to analyze suspicious archives before allowing execution in production environments. These targeted measures go beyond generic advice by addressing the specific tactics and techniques used in this campaign.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- cve: CVE-2025-0411
- hash: 4452bef7ffd8a1b0e424c4c9485289ae
- hash: 5f9af7c0324abd475d33d149b20cea2e
- hash: 8b9ad525283aa40a1af0a6b0d3e5b94d
- hash: a2cb30e15104660533baa71dfcca9613
- hash: d6951153ad26cc86cd06fde37530e4f4
- hash: 05f263f3cec9b5d64345c76785ef1493e10d80fc
- hash: 7430db4c3a2a7465a19d453e41a7a9d34ceb33e9
- hash: 796a0393c6411b3af155cf98c029d002a439f5b1
- hash: bccc8e59ade8abce2710cc005dfce1d51843e74d
- hash: dc0a40c8f2279c223ad2f832fc3c894ae0be7ec6
- hash: 497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3
- hash: 69934dc1d4fdb552037774ee7a75c20608c09680128c9840b508551dbcf463ad
- hash: a85d13a46213a83ec1910542ac42c9fc58c473b9fd0b1ddb68455cd617814c89
- hash: e32d6b2b38b11db56ae5bce0d5e5413578a62960aa3fab48553f048c4d5f91f0
- hash: f4b3c6bb24f20aa995e8b2af92c128b299446a9b7b02b5f45462e5d4c0df87f2
- domain: iolenaightdecipien.org
Potentially Unwanted Applications (PUAs) weaponized for covert delivery
Description
A malware distribution campaign leveraging digitally signed binaries, deceptive packaging, and browser hijackers has been uncovered. The campaign centers around two malicious applications, ImageLooker.exe and Calendaromatic.exe, delivered via self-extracting 7-Zip archives. These artifacts align with the TamperedChef malware campaign, which uses trojanized productivity tools for initial access and data exfiltration. The malware employs NeutralinoJS framework, Unicode homoglyphs, and multiple digital signers to bypass detection. The campaign exploits user behavior through SEO poisoning and malvertising, masquerading as legitimate software. This sophisticated approach highlights the evolving tactics of threat actors in weaponizing PUAs and abusing digital code signing to evade security measures.
AI-Powered Analysis
Technical Analysis
The threat involves a sophisticated malware distribution campaign leveraging Potentially Unwanted Applications (PUAs) that are weaponized for covert delivery. Central to this campaign are two malicious executables, ImageLooker.exe and Calendaromatic.exe, which are delivered via self-extracting 7-Zip archives. These binaries are digitally signed by multiple signers, a tactic used to bypass security detection mechanisms that often trust signed code. The campaign is attributed to the threat actor group known as TamperedChef, which is known for trojanizing productivity tools to gain initial access and conduct data exfiltration. The malware uses the NeutralinoJS framework, a lightweight application development framework, to facilitate its operations. It also employs Unicode homoglyphs—characters visually similar to legitimate ones—to deceive users and evade detection. The campaign exploits user behavior through SEO poisoning and malvertising, tricking victims into downloading what appears to be legitimate software. Additionally, the malware includes browser hijackers to manipulate victim browsing sessions. The attack chain involves multiple tactics and techniques such as code-signing abuse (T1553.002), command and scripting interpreter usage (T1059.007, T1059.001), data staging (T1074.001), persistence mechanisms (T1547.001), and credential dumping (T1003). The campaign’s complexity and use of deceptive packaging, digital signing, and social engineering highlight an evolution in threat actor tactics, weaponizing PUAs to evade traditional security controls and deliver malware covertly. Although no known exploits are currently observed in the wild, the presence of CVE-2025-0411 indicates a vulnerability leveraged by this campaign.
Potential Impact
For European organizations, this threat poses a significant risk due to its stealthy delivery and evasion techniques. The abuse of digital code signing undermines trust in signed binaries, potentially leading to widespread infection before detection. The use of trojanized productivity tools targets common enterprise software usage patterns, increasing the likelihood of successful initial access. Once inside, the malware can exfiltrate sensitive data, disrupt user browsing through hijacking, and establish persistence, complicating incident response. The SEO poisoning and malvertising components increase the attack surface by targeting users searching for legitimate software, potentially impacting a broad range of sectors including finance, healthcare, and government. The campaign’s ability to bypass detection mechanisms may result in prolonged dwell time, increasing the risk of data breaches and operational disruption. The medium severity rating reflects the balance between the complexity of exploitation and the potential for significant confidentiality and integrity impacts if successful.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this threat’s characteristics. Specifically: 1) Enforce strict application whitelisting that includes validation of digital signatures against known trusted signers and revocation lists to detect abuse of code signing. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to identify suspicious use of NeutralinoJS framework and anomalous scripting activities. 3) Enhance email and web filtering to block SEO poisoned links and malvertising domains, including proactive threat intelligence sharing to update blocklists with indicators such as the domain iolenaightdecipien.org and known malicious hashes. 4) Conduct user awareness training focused on recognizing deceptive packaging and the risks of downloading software from untrusted sources. 5) Monitor for persistence mechanisms and unusual process creations linked to trojanized productivity tools. 6) Implement network segmentation and data loss prevention (DLP) to limit data exfiltration capabilities. 7) Regularly audit and update digital certificate trust stores and promptly revoke certificates associated with malicious binaries. 8) Employ sandboxing to analyze suspicious archives before allowing execution in production environments. These targeted measures go beyond generic advice by addressing the specific tactics and techniques used in this campaign.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://fieldeffect.com/blog/potentially-unwanted-applications"]
- Adversary
- TamperedChef
- Pulse Id
- 68da3d2fbeb1286aa4f67c07
- Threat Score
- null
Indicators of Compromise
Cve
Value | Description | Copy |
---|---|---|
cveCVE-2025-0411 | — |
Hash
Value | Description | Copy |
---|---|---|
hash4452bef7ffd8a1b0e424c4c9485289ae | — | |
hash5f9af7c0324abd475d33d149b20cea2e | — | |
hash8b9ad525283aa40a1af0a6b0d3e5b94d | — | |
hasha2cb30e15104660533baa71dfcca9613 | — | |
hashd6951153ad26cc86cd06fde37530e4f4 | — | |
hash05f263f3cec9b5d64345c76785ef1493e10d80fc | — | |
hash7430db4c3a2a7465a19d453e41a7a9d34ceb33e9 | — | |
hash796a0393c6411b3af155cf98c029d002a439f5b1 | — | |
hashbccc8e59ade8abce2710cc005dfce1d51843e74d | — | |
hashdc0a40c8f2279c223ad2f832fc3c894ae0be7ec6 | — | |
hash497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3 | — | |
hash69934dc1d4fdb552037774ee7a75c20608c09680128c9840b508551dbcf463ad | — | |
hasha85d13a46213a83ec1910542ac42c9fc58c473b9fd0b1ddb68455cd617814c89 | — | |
hashe32d6b2b38b11db56ae5bce0d5e5413578a62960aa3fab48553f048c4d5f91f0 | — | |
hashf4b3c6bb24f20aa995e8b2af92c128b299446a9b7b02b5f45462e5d4c0df87f2 | — |
Domain
Value | Description | Copy |
---|---|---|
domainiolenaightdecipien.org | — |
Threat ID: 68da4863b34724c7e2fd7fc6
Added to database: 9/29/2025, 8:50:43 AM
Last enriched: 9/29/2025, 8:51:05 AM
Last updated: 9/30/2025, 12:06:51 AM
Views: 10
Related Threats
ThreatFox IOCs for 2025-09-29
MediumSVG Phishing hits Ukraine with Amatera Stealer, PureMiner
MediumOlymp Loader: A new Malware-as-a-Service written in Assembly
MediumNew LockBit 5.0 Targets Windows, Linux, ESXi
MediumXWorm RAT Delivered via Shellcode: Multi-Stage Attack Analysis
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.