Skip to main content

Potentially Unwanted Applications (PUAs) weaponized for covert delivery

Medium
Published: Mon Sep 29 2025 (09/29/2025, 08:02:55 UTC)
Source: AlienVault OTX General

Description

A malware distribution campaign leveraging digitally signed binaries, deceptive packaging, and browser hijackers has been uncovered. The campaign centers around two malicious applications, ImageLooker.exe and Calendaromatic.exe, delivered via self-extracting 7-Zip archives. These artifacts align with the TamperedChef malware campaign, which uses trojanized productivity tools for initial access and data exfiltration. The malware employs NeutralinoJS framework, Unicode homoglyphs, and multiple digital signers to bypass detection. The campaign exploits user behavior through SEO poisoning and malvertising, masquerading as legitimate software. This sophisticated approach highlights the evolving tactics of threat actors in weaponizing PUAs and abusing digital code signing to evade security measures.

AI-Powered Analysis

AILast updated: 09/29/2025, 08:51:05 UTC

Technical Analysis

The threat involves a sophisticated malware distribution campaign leveraging Potentially Unwanted Applications (PUAs) that are weaponized for covert delivery. Central to this campaign are two malicious executables, ImageLooker.exe and Calendaromatic.exe, which are delivered via self-extracting 7-Zip archives. These binaries are digitally signed by multiple signers, a tactic used to bypass security detection mechanisms that often trust signed code. The campaign is attributed to the threat actor group known as TamperedChef, which is known for trojanizing productivity tools to gain initial access and conduct data exfiltration. The malware uses the NeutralinoJS framework, a lightweight application development framework, to facilitate its operations. It also employs Unicode homoglyphs—characters visually similar to legitimate ones—to deceive users and evade detection. The campaign exploits user behavior through SEO poisoning and malvertising, tricking victims into downloading what appears to be legitimate software. Additionally, the malware includes browser hijackers to manipulate victim browsing sessions. The attack chain involves multiple tactics and techniques such as code-signing abuse (T1553.002), command and scripting interpreter usage (T1059.007, T1059.001), data staging (T1074.001), persistence mechanisms (T1547.001), and credential dumping (T1003). The campaign’s complexity and use of deceptive packaging, digital signing, and social engineering highlight an evolution in threat actor tactics, weaponizing PUAs to evade traditional security controls and deliver malware covertly. Although no known exploits are currently observed in the wild, the presence of CVE-2025-0411 indicates a vulnerability leveraged by this campaign.

Potential Impact

For European organizations, this threat poses a significant risk due to its stealthy delivery and evasion techniques. The abuse of digital code signing undermines trust in signed binaries, potentially leading to widespread infection before detection. The use of trojanized productivity tools targets common enterprise software usage patterns, increasing the likelihood of successful initial access. Once inside, the malware can exfiltrate sensitive data, disrupt user browsing through hijacking, and establish persistence, complicating incident response. The SEO poisoning and malvertising components increase the attack surface by targeting users searching for legitimate software, potentially impacting a broad range of sectors including finance, healthcare, and government. The campaign’s ability to bypass detection mechanisms may result in prolonged dwell time, increasing the risk of data breaches and operational disruption. The medium severity rating reflects the balance between the complexity of exploitation and the potential for significant confidentiality and integrity impacts if successful.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to this threat’s characteristics. Specifically: 1) Enforce strict application whitelisting that includes validation of digital signatures against known trusted signers and revocation lists to detect abuse of code signing. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to identify suspicious use of NeutralinoJS framework and anomalous scripting activities. 3) Enhance email and web filtering to block SEO poisoned links and malvertising domains, including proactive threat intelligence sharing to update blocklists with indicators such as the domain iolenaightdecipien.org and known malicious hashes. 4) Conduct user awareness training focused on recognizing deceptive packaging and the risks of downloading software from untrusted sources. 5) Monitor for persistence mechanisms and unusual process creations linked to trojanized productivity tools. 6) Implement network segmentation and data loss prevention (DLP) to limit data exfiltration capabilities. 7) Regularly audit and update digital certificate trust stores and promptly revoke certificates associated with malicious binaries. 8) Employ sandboxing to analyze suspicious archives before allowing execution in production environments. These targeted measures go beyond generic advice by addressing the specific tactics and techniques used in this campaign.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://fieldeffect.com/blog/potentially-unwanted-applications"]
Adversary
TamperedChef
Pulse Id
68da3d2fbeb1286aa4f67c07
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-0411

Hash

ValueDescriptionCopy
hash4452bef7ffd8a1b0e424c4c9485289ae
hash5f9af7c0324abd475d33d149b20cea2e
hash8b9ad525283aa40a1af0a6b0d3e5b94d
hasha2cb30e15104660533baa71dfcca9613
hashd6951153ad26cc86cd06fde37530e4f4
hash05f263f3cec9b5d64345c76785ef1493e10d80fc
hash7430db4c3a2a7465a19d453e41a7a9d34ceb33e9
hash796a0393c6411b3af155cf98c029d002a439f5b1
hashbccc8e59ade8abce2710cc005dfce1d51843e74d
hashdc0a40c8f2279c223ad2f832fc3c894ae0be7ec6
hash497ed5bca59fa6c01f80d55c5f528a40daff4e4afddfbe58dbd452c45d4866a3
hash69934dc1d4fdb552037774ee7a75c20608c09680128c9840b508551dbcf463ad
hasha85d13a46213a83ec1910542ac42c9fc58c473b9fd0b1ddb68455cd617814c89
hashe32d6b2b38b11db56ae5bce0d5e5413578a62960aa3fab48553f048c4d5f91f0
hashf4b3c6bb24f20aa995e8b2af92c128b299446a9b7b02b5f45462e5d4c0df87f2

Domain

ValueDescriptionCopy
domainiolenaightdecipien.org

Threat ID: 68da4863b34724c7e2fd7fc6

Added to database: 9/29/2025, 8:50:43 AM

Last enriched: 9/29/2025, 8:51:05 AM

Last updated: 9/30/2025, 12:06:51 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats