Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

TamperedChef: A High-Severity Multi-Stage Infostealer Operation

Red | Attack Report
Download PDF

Summary

TamperedChef Campaign Overview

The TamperedChef campaign represents a sophisticated 2025 malware operation that distributes signed fake PDF tools through SEO-driven malvertising to gain user trust. This high-severity multi-stage infostealer operation targets Windows platforms worldwide, with a unique 56-day dormancy period that allowed malicious applications to function normally before mass activation on August 21, 2025. The TamperedChef malware campaign deployed an obfuscated backdoor designed for credential theft, data exfiltration, and remote access capabilities.

TamperedChef Malware Distribution and Impact

TamperedChef malware operators used shell companies to obtain Extended Validation (EV) certificates and employed rapidly rotating infrastructure to evade detection. The TamperedChef campaign heavily impacted U.S. victims, representing approximately 80% of infections, with significant targeting of healthcare, construction, and manufacturing sectors. The TamperedChef threat demonstrates financially motivated objectives including initial access brokerage, credential theft, and potential ransomware staging capabilities.

TamperedChef Attack Regions and Targeted Industries

The TamperedChef malware operation targeted regions worldwide with primary concentration in the United States. Affected industries include healthcare organizations, construction companies, manufacturing facilities, industrial operations, hospitality businesses, legal firms, non-profit organizations, technology companies, retail establishments, transportation services, agriculture operations, automotive businesses, educational institutions, energy providers, and government agencies. The TamperedChef campaign specifically exploited users searching for product manuals and PDF editing utilities through poisoned search results and malicious SEO-optimized advertisements.

Attack Details

TamperedChef Initial Infection Vector

The TamperedChef campaign began in late June 2025, utilizing highly convincing malvertising techniques with fake, signed installers masquerading as legitimate productivity tools such as PDF editors. TamperedChef malware distribution relied on poisoned search results and malicious SEO-optimized advertisements targeting users searching for product manuals or PDF editing utilities. The TamperedChef installers were signed with legitimate Extended Validation certificates obtained through U.S. shell companies including Stratus Core Digital LLC and DataX Engine LLC, as well as Malaysian entities, lending credibility to the malicious applications.

TamperedChef Dormancy Period and Activation Mechanism

A defining characteristic of the TamperedChef malware is its deliberate 56-day dormancy period. During this TamperedChef dormancy phase, the fake PDF applications provided genuine PDF-editing functionality while covertly establishing persistence mechanisms. This TamperedChef delay strategy, aligned with common Google Ads campaign cycles, enabled the malware to evade sandbox analysis and achieve broad distribution before mass activation. The TamperedChef payload was triggered using the “–fullupdate” command on August 21, 2025, initiating the malicious activities across infected systems simultaneously.

TamperedChef Backdoor Deployment and Capabilities

Upon TamperedChef activation, the malware drops task.xml to create a scheduled task that executes a heavily obfuscated JavaScript backdoor. The TamperedChef backdoor runs silently in the background, forcibly terminates browser processes, and abuses Windows Data Protection API (DPAPI) to decrypt stored passwords, cookies, and authentication tokens. The TamperedChef malware gathers comprehensive machine metadata including system information, installed software, and security configurations. Stolen data is transmitted to attacker-controlled Command and Control (C2) servers using XOR encryption with random keys to obfuscate exfiltration activities.

TamperedChef Remote Access and Persistence

The TamperedChef backdoor supports remote code execution capabilities, enabling persistent access to compromised systems. TamperedChef operators can execute arbitrary commands, deploy additional payloads, and maintain long-term access for credential theft, data exfiltration, and potential ransomware deployment. The TamperedChef persistence mechanisms include registry key modifications at HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PDFEditorUpdater, scheduled tasks named “PDFEditorScheduledTask,” and file placement in %LOCALAPPDATA%\Programs\PDFEditor\ directories.

TamperedChef Infrastructure and Attribution

TamperedChef operators demonstrate strong industrialization capabilities, utilizing U.S. shell companies and Malaysian entities to obtain legitimate Sectigo Extended Validation certificates, which they rapidly rotate after revocation. The TamperedChef infrastructure employs short-lived NameCheap-registered domains and evolving Command and Control naming conventions, transitioning from Domain Generation Algorithm (DGA)-style strings to human-readable names. While the TamperedChef campaign remains unattributed to specific threat actors, motivations appear financially driven, focusing on initial access brokerage, credential theft, ransomware staging, with possible opportunistic espionage capabilities.

Recommendations

TamperedChef Hunting and Remediation Procedures

Organizations should immediately search for TamperedChef persistence indicators including the registry key HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PDFEditorUpdater, scheduled tasks named “PDFEditorScheduledTask,” and file presence in %LOCALAPPDATA%\Programs\PDFEditor\ directories. These indicators directly align with known TamperedChef Indicators of Compromise (IOC) patterns. For confirmed TamperedChef infections, security teams should implement immediate credential resets across affected user accounts and perform full system reimaging due to the malware’s deep persistence and advanced evasion capabilities. TamperedChef remediation requires comprehensive forensic analysis to identify lateral movement and data exfiltration scope.

TamperedChef Behavioral Detection with EDR Solutions

Implement Endpoint Detection and Response (EDR) solutions tuned specifically for TamperedChef behavioral patterns including browser process termination by non-browser applications, creation of scheduled tasks using XML files, and suspicious JavaScript execution from AppData folders. These detection capabilities address the TamperedChef campaign’s obfuscation techniques and modular tactics effectively. Deploy Microsoft Sysmon with custom detection rules aligned with TamperedChef Tactics, Techniques, and Procedures (TTPs) following documented incident response practices. EDR behavioral monitoring should flag TamperedChef indicators including Windows DPAPI abuse for credential access and XOR-encrypted C2 communications.

TamperedChef Network Infrastructure Blocking

Security teams should block known TamperedChef Command and Control domains including api.mxpanel.com and associated infrastructure at network perimeter layers. Implement DNS security solutions and integrate TamperedChef Indicators of Compromise feeds into Security Information and Event Management (SIEM) systems for automated containment. Monitor HTTPS outbound connections from productivity applications to suspicious domains associated with TamperedChef operations. Network security controls should enforce strict egress filtering to prevent TamperedChef data exfiltration and C2 communications through non-standard ports and protocols.

TamperedChef Application Control Policies

Enforce strict software installation policies allowing only vetted PDF editors and productivity suites through approved corporate channels to prevent TamperedChef malware installation. Block unauthorized software downloads and implement application whitelisting to reduce user exposure to TamperedChef malicious installers. This foundational security control directly prevents the initial infection vectors used by TamperedChef campaigns. Organizations should maintain an approved software catalog and enforce digital signature verification for all executables, specifically validating Extended Validation certificates against revocation lists to detect TamperedChef signed malware.

TamperedChef User Awareness and Security Training

Conduct comprehensive user awareness training addressing TamperedChef social engineering tactics, emphasizing the dangers of downloading free or unknown software alternatives from search engine results. Train employees to recognize TamperedChef malvertising techniques on search engines and understand the risks of clicking sponsored results or advertisements for productivity tools. Emphasize mandatory IT approval processes for all software installations as an industry best practice to prevent TamperedChef infections. Security awareness programs should include specific examples of TamperedChef fake PDF editor distribution and the importance of obtaining software exclusively from official vendor websites or authorized enterprise software repositories.

Indicators of Compromise (IoCs)

TamperedChef Malware SHA256 Hashes

The following SHA256 file hashes are associated with TamperedChef malware samples. Security teams should integrate these TamperedChef IOCs into endpoint protection platforms, SIEM solutions, and threat intelligence feeds for detection and blocking:

Type SHA256 Hash Value
SHA256 0826824694c80b854603f4c4103133113a197d3ecbca4308899ae9d6f05847fa
SHA256 08ea829d5c97aab089abe19686d274f829aa1cee3670d2819885e33f39a4d602
SHA256 105e58c4c04b56607badd705411e3322c152b8dbb21d994e7cdec62253a0e454
SHA256 244251cab1f6df4bb39ba28645cbc4e26f84298b588b568a796d6520912c6156
SHA256 26163c7da9f0d9000937663497d7eb15df5c205cc2edbb71d664f08a5b1f80ce
SHA256 2a3f76fc7f953403653eff71f21c16d40512c1bcd7a038657bb1d0a4efbee677
SHA256 2bfa87dee2000f4e7889174f051ab88f4b690d08629b94721e321c44b7cf1bd3
SHA256 2c9895fbdf8b86715a8e501f85d206b28cf9b61478826409a8a8ea17a067da22
SHA256 35c34043a4a8b1f15ce9ab7661be6ace91348f725d59e53f04a36c41999812c7
SHA256 3d4bdd41ebc630b8b676fc39e14de75a59cebf545cf342a4dea8072f5768c13e
SHA256 406e26453a9eb779da6dd792e82cf904fbaf11b9e15471316276bb49098bdbf6
SHA256 504a614d8baae84c7c57e1786d22981fb016e4c9396ab10cc73197aa483d9261
SHA256 6438b3c4eb5810c003d6f2cf1712652d3ce0504f08ae05aec1f07594e0a58a52
SHA256 6c4e54bbf98113068bdeef172ae6fb05fe1e99bb50ae4622b06e06af35b2b043
SHA256 6e4cd57e87e034723d4c1a3ff93e8c9def0f27961da3e5bc361536e847a119cb
SHA256 898aa0bca40ec01d3564cb33f7a79f2e651f987ea65db913a62d427973ba5478
SHA256 94acbfe1958b1b985701c8232fd3262ee01ef665ba59a92489b900d8f988b233
SHA256 9704e97a395649e9ea4450b3afde5c1f1b22caa05407c4db3ef1625b9db05324
SHA256 9f572779dba2ef760f8a2bd7391dcafc099c430bcbd94c7d5247b210e1f095da
SHA256 abb7541aba5abe1ff27b3867c1d45cea9c678743648ed8eed50bf32f8676e510

Note: Additional TamperedChef SHA256 hashes are available in the complete Indicators of Compromise dataset. The PDF document indicates that remaining IOCs can be accessed on the threat intelligence platform. Organizations should request the complete TamperedChef IOC feed for comprehensive protection.

MITRE ATT&CK TTPs

TamperedChef MITRE ATT&CK Tactics and Techniques

The TamperedChef malware campaign employs numerous techniques mapped to the MITRE ATT&CK framework. Security teams should configure detection rules and behavioral analytics aligned with these TamperedChef TTPs:

Tactic ID Tactic Name Technique ID Technique Name
TA0001 Initial Access T1189 Drive-by Compromise
TA0001 Initial Access T1608 Stage Capabilities
TA0001 Initial Access T1608.006 SEO Poisoning
TA0002 Execution T1204 User Execution
TA0002 Execution T1204.002 Malicious File
TA0002 Execution T1059 Command and Scripting Interpreter
TA0002 Execution T1059.003 Windows Command Shell
TA0002 Execution T1059.007 JavaScript
TA0002 Execution T1053 Scheduled Task/Job
TA0002 Execution T1053.005 Scheduled Task
TA0003 Persistence T1547 Boot or Logon Autostart Execution
TA0003 Persistence T1547.001 Registry Run Keys / Startup Folder
TA0004 Privilege Escalation T1548 Abuse Elevation Control Mechanism
TA0005 Defense Evasion T1027 Obfuscated Files or Information
TA0005 Defense Evasion T1036 Masquerading
TA0005 Defense Evasion T1070 Indicator Removal
TA0005 Defense Evasion T1497 Virtualization/Sandbox Evasion
TA0005 Defense Evasion T1497.003 Time Based Evasion
TA0005 Defense Evasion T1553 Subvert Trust Controls
TA0005 Defense Evasion T1553.002 Code Signing
TA0006 Credential Access T1555.003 Credentials from Web Browsers
TA0006 Credential Access T1539 Steal Web Session Cookie
TA0006 Credential Access T1552 Unsecured Credentials
TA0007 Discovery T1082 System Information Discovery
TA0007 Discovery T1518 Software Discovery
TA0007 Discovery T1518.001 Security Software Discovery
TA0007 Discovery T1046 Network Service Discovery
TA0007 Discovery T1012 Query Registry
TA0009 Collection T1005 Data from Local System
TA0010 Exfiltration T1041 Exfiltration Over C2 Channel
TA0011 Command and Control T1071 Application Layer Protocol
TA0011 Command and Control T1071.001 Web Protocols
TA0011 Command and Control T1102 Web Service
TA0011 Command and Control T1132 Data Encoding
TA0011 Command and Control T1132.001 Standard Encoding
TA0011 Command and Control T1573 Encrypted Channel
TA0040 Impact Various Potential Ransomware Deployment

References

TamperedChef Threat Intelligence Sources

The following authoritative sources provide additional technical analysis and intelligence regarding the TamperedChef malware campaign:

1. Acronis Threat Research Unit:
https://www.acronis.com/en/tru/posts/cooking-up-trouble-how-tamperedchef-uses-signed-apps-to-deliver-stealthy-payloads/

2. WithSecure Labs:
https://labs.withsecure.com/publications/tamperedchef

3. Twilight Cyber:
https://twilightcyber.com/tamperedchef-infostealer-fake-pdf-editor-malvertising-2025/

Security teams should consult these TamperedChef threat intelligence publications for comprehensive technical indicators, behavioral analysis, and additional detection methodologies.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox