Take a Product Tour Request a Demo Cybersecurity Assessment Contact Us

Blogs

The latest cybersecurity trends, best practices, security vulnerabilities, and more

Technical Deep Dive: The Monero Mining Campaign

Executive summary

In the contemporary threat landscape, while ransomware grabs headlines with high-impact disruptions, cryptojacking operations have quietly evolved into sophisticated, persistent threats. This report details a comprehensive forensic analysis of a recently identified cryptocurrency mining campaign. This operation distinguishes itself not merely by its payload but by its high level of technical integration and redundant persistence mechanisms.

Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim system. Furthermore, the malware exhibits worm-like capabilities, spreading across external storage devices, enabling lateral movement even in air-gapped environments.

This blog dissects the malware operation from the initial social-engineering lure to the execution of privileged instruction sets in Ring 0, offering a granular view of the attackers’ tradecraft, tooling, and operational security posture.

1. Introduction: The evolution of commodity cryptojacking

Cryptojacking, the unauthorized use of a victim's computing resources to mine cryptocurrency, has transitioned from a browser-based nuisance (typified by Coinhive scripts) to a system-level threat utilizing advanced malware techniques. The economic incentives for attackers are clear: unlike ransomware, which requires a victim to pay, cryptojacking generates revenue continuously as long as the infection persists. To maximize this revenue, attackers must solve two problems: longevity (persistence) and efficiency (hashrate).

Scope of analysis

This report analyzes a specific infection cluster identified in late 2025. The primary artifacts include a deceptive installer, a legitimate but vulnerable driver, and a customized wrapper for the XMRig miner.

2. Infection vector and social engineering

The entry point for this campaign relies on a classic but highly effective social engineering tactic: the promise of free premium software. The distribution vector is identified as pirated software bundles, specifically masquerading as legitimate installers for office productivity suites.

3. The "Explorer.exe" controller: Architecture and operational philosophy

The "Explorer.exe" binary [MD5: bb97dfc3e5fb8109bd154c2b2b2959da] functions as the primary orchestration node for the infection. In traditional malware design, functionality is often compartmentalized into a linear execution flow: a dropper downloads a payload, executes it, and exits. Explorer.exe (controller), however, operates as a persistent state machine. It determines its behavioral mode based on the specific command-line arguments passed to it during execution, allowing a single binary file to serve multiple distinct operational roles within the infection lifecycle: installer, watchdog, payload manager, and cleaner.

3.1 The "Brain" vs. "Brawn" separation

A key insight derived from the reverse engineering of the "Explorer.exe" is the deliberate architectural separation of command logic ("Brain") from execution logic ("Brawn"). This modular design principle enhances the stability and resilience of the infection.

  • The Brain (Explorer.exe): This component handles logic, monitoring, timing, and decision-making. It is designed to be lightweight and stable. It does not perform the heavy computational lifting (mining) or the high-risk aggressive actions (process termination) directly. This minimizes the risk of the controller crashing or triggering behavioral heuristics in security software, ensuring the "manager" remains active even if the "workers" are neutralized.
  • The Brawn (Payloads):
    • Mining operations: Handled by “Microsoft Compatbility Telemetry.exe”, a wrapper for the XMRig miner.
    • Enforcement operations: Watchdogs
    • Kernel access: Handled by WinRing0x64.sys, a vulnerable driver exploited to gain Ring 0 access.
Figure 1: Overall File Inventory
Figure 1: Overall File Inventory

3.2 The “Cultural Profiling”: Command line parameters and state control

The malware's internal logic is heavily laden with references to the anime series Re:Zero - Starting Life in Another World. The use of strings such as Re:0 and barusu suggests a specific psychological profile of the malware author. 

These references are not mere superficial additions but are functionally integrated into the control flow. Specifically, the "002 Re:0" argument initiates the "Active Infection" mode. This is a direct parallel to the anime protagonist's "Return by Death" ability, a metaphor that perfectly illustrates the malware's persistence mechanism: much like the protagonist's resurrection, if the infection is terminated, its watchdog components ensure it "returns.”

The malware implements a form of "mode switching" via command-line arguments. This technique serves a dual purpose: it maximizes code reuse (allowing one binary to perform all necessary functions) and acts as a rudimentary anti-analysis mechanism.

The following table details the command line parameters decoded from the binary entry point logic, correlating specific parameters with their internal mode names and functional roles:

Parameter Internal mode name Functional role Trigger mechanism
(None) Installation mode Environment validation and migration. Checks if running from the correct path; if not, copies to the target and exits. User double-click (Initial Infection via Dropper).
002 Re:0 Active infection The "Master" mode. Drops payload files, starts the miner, and enters the main monitoring loop. Self-triggered after successful installation and migration.
016 Maintenance Health check mode. Scans for the miner process. If running, exit. If dead, restart it. Triggered by watchdog processes (msedge.exe, ksomisc.exe).
barusu Kill switch Destruct sequence. Terminates all malware components and deletes files. Triggered by the "Time Bomb" (Date Check) or manual cleanup routine.
Table 1: Command Line Parameter Analysis of the Controller

3.3 The "Time Bomb" logic: A campaign lifecycle

A significant discovery within the sub_14000D180 function is a hardcoded temporal check, serving as a "kill switch" or "time bomb." This mechanism operates by retrieving the local system time and comparing it against a predetermined deadline: December 23, 2025.

Figure 2: Check for a specific date logic
Figure 2: Check for a specific date logic

The malware's behavior diverges based on this date:

  • Active phase (Pre-Dec 23, 2025): The malware proceeds with the standard infection routine, installing the persistence modules and launching the miner.
  • Expiration phase (Post-Dec 23, 2025): This suggests that the campaign is not intended to be an indefinite operation. It implies a "fire-and-forget" lifecycle, possibly timed to coincide with the expiration of rented Command & Control (C2) infrastructure, a predicted shift in the cryptocurrency market (specifically Monero difficulty adjustments), or a planned transition to a new malware variant.

3.4 The "Barusu" protocol (cleanup routine)

When the binary is launched with the barusu argument triggered either by the Time Bomb or potentially by a manual command from the threat actor, it enters a comprehensive cleanup mode designed to wipe the infection from the host. This is not a chaotic self-destruct; it is a controlled decommissioning of the infection.

The Cleanup sequence:

  1. Snapshot & hunt: It calls the Process Scanner (sub_14000B700) to generate a dynamic list of all running processes on the host.
  2. Targeted termination: It iterates through the list, looking for specific operational components of the malware:
    • Microsoft Compatbility Telemetry.exe (The Miner)
    • explorer.exe (The Process killer)
    • msedge.exe (Persistence Watchdog 1)
    • ksomisc.exe (Persistence Watchdog 2)
    • Wpsupdate.exe (Persistence Watchdog 3)
  3. Process killing: It terminates these processes using the TerminateProcess API to release their file locks. 
  4. File wipe: Once the processes are dead, it calls the DeleteFileW API on the dropped payloads, removing the WPS, Microsoft Edge, and root explorer.exe files it created.
Figure 3: else block that handles the barusu flag.
Figure 3: else block that handles the barusu flag.

3.5 Path enforcement logic

Upon execution without arguments (the standard behavior when a user double-clicks a downloaded file), Explorer.exe calls the Windows API GetModuleFileNameW to retrieve its current full path on the disk. It then compares this string against a hardcoded target path:

C:\Users\%USERNAME%\explorer.exe

This comparison creates a critical fork in the execution flow:

  1. The Match Condition (Already Installed): If the current path matches the target path, the malware assumes it is successfully installed in the correct location. It then re-launches itself with the argument 002 Re:0 to begin the active infection phase.
  2. The Mismatch Condition (New Infection): If the path does not match (e.g., the user ran the installer explorer.exe from C:\Users\User\Downloads\ or C:\Users\User\Desktop\), the malware assumes it is in the setup phase.
    • It identifies the target destination: C:\Users\%USERNAME%\explorer.exe
    • It copies itself to this target path using CopyFileW.
    • It executes the new copy (which will now find a path match).
    • Crucially, it immediately calls exit(0) to terminate the original process running in the Downloads folder.

3.6 Resource management and payload extraction

Explorer.exe acts as a self-contained carrier for the entire infection suite. It does not rely on downloading payloads from a remote C2 server.

The resource section and decompression

The payload is stored within the binary PE Resource Section under the ID BIN (Resource ID 120). The malware uses the standard Windows APIs FindResourceW, LoadResource, and LockResource to access this data blob in memory.

Figure 4: Resource section view
Figure 4: Resource section view


Figure 5: Resource data decryption routine (sub_14000C0A0)
Figure 5: Resource data decryption routine (sub_14000C0A0)

The loaded resource is a compressed archive. Function sub_14000AA20 decompresses this blob. 

The file inventory

Once decompressed, the data blob is split into seven distinct files, which are written to disk. The file inventory reveals the malware's multi-layered strategy of deception and persistence:

Filename Role Masquerade / technique
Microsoft Compatbility Telemetry.exe Miner Wrapper Mimics the legitimate Windows Telemetry service (CompatTelRunner.exe). Loads the mining DLL. Typosquatting (missing 'i' in Compatibility).
Kernel32 .dll XMRig DLL The actual mining code is compiled as a DLL. Uses the "Space" trick to look like a system DLL (kernel32.dll).
explorer .exe Ghost Enforcer A killer process used to terminate security tools. Uses the "Space" trick.
WPS\wps.exe Decoy and Persistence Keeper Mimics WPS Office software to justify the folder presence to the user.
ksomisc.exe Persistence Keeper Watchdog process 
Microsoft Edge\edge.exe Persistence Keeper Watchdog process 
winRing0x64.sys Exploit Driver Legitimate but vulnerable driver (CVE-2020-14979) used for BYOVD exploitation.
Table 2: Dropped file and its role

Immediately after writing these files to disk, Explorer.exe calls SetFileAttributesW to apply FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM. This renders the files invisible to the user unless the "Show hidden files" and "Show protected operating system files" options are explicitly enabled in Windows Folder Options.

3.7 The main orchestration loop

Once the payload is dropped and the environment is mapped, Explorer.exe (running in 002 Re:0 mode) enters its main orchestration loop (sub_14000D330). This is an infinite loop that serves as the heartbeat of the infection, maintaining the state of the botnet node. 

The function starts with while ( 1 ) infinite loop and does all the work, then sleeps for 200ms 

Circular dependency: The self-healing watchdog topology

The campaign employs a redundant, circular persistence model reminiscent of the mythical Hydra—cut off one head, and another takes its place. This is achieved through the interaction between Explorer.exe and its "Keepers" (Watchdogs).

The loop uses GetTickCount64 (which retrieves the number of milliseconds since the system started) to seed a custom random number generator. Based on this timer, the malware randomly launches one of its Keepers:

  • C:\Users\%USERNAME%\Microsoft Edge\edge.exe
  • C:\Users\%USERNAME%\WPS\WPS Office Module.exe
  • C:\Users\%USERNAME%\WPS\wps.exe
Figure 6: The Randomization Algorithm
Figure 6: The Randomization Algorithm

These Keepers are not independent programs; they are clones or specific variants of the controller designed to execute the command immediately:

explorer.exe 016

This command points back to the main Explorer.exe binary. This creates a self-reinforcing loop:

  • Scenario A (main crash): If Explorer.exe crashes or is terminated, the next scheduled run of edge.exe (Keeper) will execute explorer.exe 016, which checks the miner and restarts the main logic if necessary.
  • Scenario B (keeper death): If the user deletes or kills edge.exe, Explorer.exe (which is running independently in its loop) will simply re-launch or re-drop it during its next loop iteration.
Figure 7: The Circular Dependency flowgraph
Figure 7: The Circular Dependency flowgraph

This "Circular Watchdog" topology makes the malware extremely annoying to remove. A user must terminate all components almost simultaneously to stop the cycle; otherwise, the surviving components essentially "resurrect" the dead ones within seconds.

System surveillance

The malware utilizes the Process32First and Process32Next functions to traverse this process snapshot. However, identifying a target based solely on its process name, such as explorer.exe, is often inadequate for advanced malware due to potential name ambiguity. Consequently, Explorer.exe employs an additional, more sophisticated method:

  1. It obtains a handle to each process using OpenProcess with specific access rights (likely PROCESS_QUERY_INFORMATION or PROCESS_VM_READ).
  2. It uses K32GetModuleFileNameExW to resolve the Full Filesystem Path of the executable image.
Figure 8: process list query loop
Figure 8: process list query loop

This path resolution is critical for three operational objectives:

  1. Self-identification: It must distinguish between its own components (C:\Users\User\explorer.exe) and the system's legitimate shell (C:\Windows\explorer.exe).
  2. Health monitoring: It scans specifically for Microsoft Compatbility Telemetry.exe (the miner) to ensure it is running. If the process is missing from the snapshot, the controller knows to restart it.

The miner watchdog and aggressive defense

The loop constantly queries the status of the miner process (Microsoft Compatbility Telemetry.exe).

  • Restart Logic: If the miner process is missing from the snapshot or returns an exit code indicating failure, Explorer.exe relaunches it immediately.
Figure 9: Microsoft Compatibility Telemetry.exe process check.
Figure 9: Microsoft Compatibility Telemetry.exe process check.

  • The "Nuclear" option: Analysis reveals a specific aggressive defense mechanism. If the miner fails to start repeatedly or encounters specific error states (possibly indicating a file lock or antivirus interference), Explorer.exe attempts to call TerminateProcess on the Real Windows Explorer (C:\Windows\explorer.exe).
Figure 10: Logic targets the real Explorer and the termination process
Figure 10: Logic targets the real Explorer and the termination process

Killing the system's explorer.exe causes the Windows taskbar, start menu, and desktop icons to disappear. This effectively "blinds" the user, creating panic and often forcing a soft reboot of the user session. This chaos provides cover for the malware to attempt a re-injection during the shell restart sequence, effectively resetting the board in its favor.

3.8. Lateral propagation: The worm module

A distinguishing feature of this XMRig variant is its aggressive propagation capability. It does not rely solely on the user downloading the dropper; it actively attempts to spread to other systems via removable media. This transforms the malware from a simple trojan into a worm.

The WM_DEVICECHANGE listener

The functions sub_1400132E0 and sub_14000E090 contain the logic for the worm module. It creates a Hidden Window (Class Name " ") using CreateWindowExW with SW_HIDE. Instead of polling the system for new drives (which consumes CPU and generates detectable I/O noise), the malware registers a passive listener using the Windows API RegisterDeviceNotificationA

Figure 11: Listener function showcasing WM_DEVICECHANGE (Event 537) and DBT_DEVICEARRIVAL (0x8000).
Figure 11: Listener function showcasing WM_DEVICECHANGE (Event 537) and DBT_DEVICEARRIVAL (0x8000).

It configures a DEV_BROADCAST_DEVICEINTERFACE filter to listen for the WM_DEVICECHANGE (0x219) message. Specifically, it waits for the DBT_DEVICEARRIVAL (0x8000) event code, which the Windows kernel broadcasts to all top-level windows when a device is inserted.

Figure 12: Code block from sub_1400132E0 that proves the worming capability
Figure 12: Code block from sub_1400132E0 that proves the worming capability

Propagation logic

When a device insertion event is detected, the malware inspects the dbcv_devicetype. It specifically looks for type 2 (DBT_DEVTYP_VOLUME), which corresponds to logical storage volumes like USB flash drives or external hard disks.

Code Artifact Meaning
WM_DEVICECHANGE (537) Watching for hardware changes.
DBT_DEVICEARRIVAL (0x8000) Something was just plugged in.
DBT_DEVTYP_VOLUME (2) It is a storage device (USB/HDD).
v7 = 65 ... 90 iterates through drive letters (E:, F:, G:) to identify the new volume.
sub_140014190 copies the explorer.exe binary to the drive and creates a hidden folder for the payload.
Table 3: Worm module artifact

The infection routine typically involves copying the explorer.exe binary to the USB drive, creating a hidden folder for the payload, and creating an LNK (shortcut) exploit (masquerading as the drive icon) to trick the user into executing the malware when they open the USB drive on a different computer.

3.9. UI spoofing - Icon tamperer via registry manipulation. (sub_1400072F0)

This function is a specific "Stealth Toggle" designed to manipulate the visual appearance of files in Windows Explorer. Its goal is to make malicious Shortcut (.lnk) files look indistinguishable from legitimate Executables or Documents by removing the small curved arrow overlay in the bottom-left corner of its icon.

Figure 13: Icon Tampering using Registry modification.
Figure 13: Icon Tampering using Registry modification.

The toggle logic

The code branches based on the input a1 show as in Table 4

Input (a1) Action Registry Operation Visual Result
0 Hide Arrow RegDeleteValueW "IsShortcut" Clean icon (no overlay)
1 Show Arrow RegSetValueExW "IsShortcut" Default icon (with arrow)
Table 4. Icon registry operation

When is it called

The cross-references (WinMain+156 and WinMain+84F) indicate it is used at specific lifecycle stages.

Figure 14: Cross-reference of the Icon Tamperer function.
Figure 14: Cross-reference of the Icon Tamperer function.

  1. Infection phase (WinMain+156): Called with 0 (Hide). This prepares the environment before the malware creates any malicious shortcuts on the drives (via the Worm module). It ensures the user won't see the "Shortcut Arrow" warning sign on newly infected files.
  2. The "Cleanup" phase  (WinMain+84F): Called with 1 (Restore). After the malicious payload executes, the code attempts to cover its tracks, followed by the File Deletion Loop calling the DeleteFileW API repeatedly to leave no evidence.

4. The watchdogs: Strategic redundancy

To ensure the malware survives attempts at removal, the attacker drops three distinct executables in subfolders masquerading as legitimate software:

  1. C:\Users\%USERNAME%\Microsoft Edge\edge.exe [SHA256: 705e3be6bab0b0773e89de02dc53e4947db65a41d93cfe2b592b43fd3d2f4f74]
  2. C:\Users\%USERNAME%\WPS\wps.exe (or wpsupdate.exe) [SHA256: 69c8c640f35d3f23f8e2997770833f99652a36c5c9c6f6354b021ba3eab93257]
  3. C:\Users\%USERNAME%\WPS\ksomisc.exe [SHA256: ebdfb99d7125311dfa8261bb7a98e2e415d15d67369f923f31fb27e36d446ec9]

Upon recovering these samples, we performed a binary differentiation (BinDiff) analysis to compare their internal logic and found they are functionally identical. Despite having different filenames and icons to match their disguise, the compiled code, entry point logic (sub_140001410), and string structures are exact matches. The attacker compiled a single "Trigger" payload and renamed it multiple times to create a redundant safety net. If a user deletes the fake "Edge" browser, the fake "WPS" update remains to sustain the infection.

5. The ghost enforcer: explorer .exe 

The Explorer.exe acts as the Main Controller and persistence engine, managing the infection lifecycle and monitoring system health. It spawns explorer .exe [SHA256: 51b98f8fb38e822245a1b22864652d7d091dd2f52424786051cbc8131b7e782b], which functions as a transient Process Killer designed to terminate processes. 

The handshake happens via ShellExecuteExW and passing a list of target process names as command-line arguments. Explorer .exe(killer) then resolves these names to PIDs, terminates them, and immediately exits, operating on a "fire-and-forget" basis.

Figure 15: Handshake flowgraph
Figure 15: Handshake flowgraph

6. Microsoft Compatbility Telemetry.exe - The payload wrapper

The ultimate goal of the campaign is to run the XMRig miner. However, running the standard xmrig.exe is a guaranteed way to trigger antivirus detection. To avoid this, the attackers employ a sophisticated wrapping and sideloading technique.

6.1 The Microsoft telemetry App masquerade

The mining process is named Microsoft Compatbility Telemetry.exe. [SHA256:5936ae20028b79e3ebb58f863960e56f93aed4e7a07f0b39a80205a8a7df5579]

  • Typosquatting: Note the missing 'i' in "Compatbility". The legitimate Windows binary is CompatTelRunner.exe, often described in Task Manager as "Microsoft Compatibility Telemetry".
  • Visual camouflage: By adopting a name that is visually similar to a known, high-noise Windows system process, the malware hopes to blend in. Users are accustomed to seeing "Telemetry" processes consuming resources, so they may overlook the miner's activity.

6.2 DLL sideloading and the "Kernel32" trick

The executable Microsoft Compatbility Telemetry.exe does not contain the mining code itself. It is a "dumb" loader. Analysis reveals it uses DLL Sideloading to load the actual payload.

Here, the "Space Trick" appears again. The malware attempts to load a DLL named kernel32 .dll (with a space).

This fake DLL is actually the XMRig miner compiled as a dynamic library. The loader then calls GetProcAddress to find the exported function xmrig_main.

Figure 16: Xmrig dll sideloading
Figure 16: Xmrig dll sideloading

6.3 Argument parsing and execution

The wrapper acts as a translator. It takes the arguments passed to the EXE (e.g., --coin XMR --url xmr-sg.kryptex.net) and converts them into the format expected by the XMRig DLL. This decoupling of the loader and the miner allows the attackers to easily swap out the mining DLL (e.g., updating the XMRig version) without changing the persistent loader executable.

7. Deep dive: Kernel mode exploitation (BYOVD)

The most technically sophisticated component of this malware is its use of the Bring Your Own Vulnerable Driver (BYOVD) technique. This allows the user-mode miner to execute code with Kernel (Ring 0) privileges, bypassing the operating system's hardware abstraction layer.

7.1 The target: WinRing0x64.sys

The malware drops a driver file named WinRing0x64.sys. This is a legitimate driver component of the "OpenLibSys" library, historically used by hardware monitoring tools (like Core Temp or MSI Afterburner) to read CPU temperatures and fan speeds.

However, version 1.2.0 of this driver contains a critical vulnerability, assigned CVE-2020-14979.

In its DriverEntry routine, the driver creates a device object (\Device\WinRing0_1_2_0) but fails to apply a restrictive Security Descriptor (SDDL). It creates the device with a NULL DACL (Discretionary Access Control List).

This means any user on the system, regardless of privilege level, can open a handle to this driver and send it commands. Since the driver is designed to read/write specific CPU registers, this effectively gives any user full control over the CPU's low-level configuration.

Figure 17: IOCTL Transmission code.
Figure 17: IOCTL Transmission code.

7.2 The exploit chain

The integration of this exploit into the XMRig payload is visible in the function sub_1802981C0 within the malicious DLL.

  1. Service creation: The malware calls CreateServiceW with the argument SERVICE_KERNEL_DRIVER (0x1). It points the service to the dropped WinRing0x64.sys file.
  2. Driver loading: It calls StartServiceW, forcing the Windows kernel to load the vulnerable driver.
  3. Communication channel: It calls CreateFileW(L"\\\\.\\WinRing0_1_2_0",...) to open a handle to the driver. Due to the CVE-2020-14979 this succeeds.
  4. IOCTL transmission: The miner uses DeviceIoControl to send specific Input/Output Control (IOCTL) codes to the driver.

7.3 MSR modification and hashrate boosting

The ultimate goal of this kernel excursion is to modify the Model Specific Registers (MSRs) of the CPU.

The RandomX mining algorithm used by Monero is designed to be "ASIC-resistant" and CPU-friendly. It relies heavily on random access to the CPU's cache memory. Modern CPUs have features called Hardware Prefetchers. These components predict what data the CPU will need next and fetch it from RAM into the L2/L3 cache.

  • The Problem: For standard programs (linear access), prefetchers are great. For RandomX (random access), prefetchers are detrimental. They fill the valuable cache with predicted data that is never used, evicting the actual mining data and causing "cache thrashing."
  • The Solution (The Exploit): The malware sends the IOCTL code 0x9C402088 (Write MSR) to the driver. The data packet contains the instruction to write to the MSR_PREFETCH_CONTROL register (Address 0x1A4 on Intel CPUs).
  • The Result: The command disables the "L2 Hardware Prefetcher" and "L2 Adjacent Cache Line Prefetcher." Tests indicate this optimization increases the RandomX hashrate by 15% to 50%.

By utilizing BYOVD, the malware achieves this optimization without needing to write its own malicious driver (which would require a valid digital signature to load on modern Windows). It simply piggybacks on the valid signature of the old, vulnerable WinRing0 driver.

8. Threat intelligence and attribution

8.1 Infrastructure and monetization

The campaign utilizes the Kryptex mining pool (xmr-sg.kryptex.net).

  • Mining pool: The campaign utilizes xmr-sg.kryptex.network:8029. Kryptex is a consumer-grade mining platform that pays out in fiat or Bitcoin, popular among entry-level cybercriminals for its ease of laundering.
  • Wallet: 42DKy5tDGH5MjwWDw2nAj7ZydTsX43cxM5T7zfjPezaEav51eALbqQhDo6ZUgF58tA3s28LnvSTUKTdAZUtqcGXsTBZrDfH. This is a standard Monero address. Due to Monero's ring signatures and stealth addresses, the balance and transaction history are opaque, making the proceeds untraceable.

8.2 Campaign status

The threat actor is currently testing the infection chain and persistence mechanisms (like the "Barusu" kill switch) on a small number of machines before a wider distribution. The pool reports 1 active worker (identified as "a") with a 24-hour average hashrate of approximately 1.24 KH/s.

Figure 18: Kryptex Pool Statistic (8 Dec, 2025)
Figure 18: Kryptex Pool Statistic (8 Dec, 2025)

Historical data shows sporadic mining activity throughout November 2025, with a distinct spike in activity beginning on December 8, 2025. This correlates with the analysis timeline, suggesting either a fresh deployment of the campaign or the activation of new nodes.

9. Conclusion

This campaign serves as a potent reminder that commodity malware continues to innovate. By chaining together social engineering, legitimate software masquerades, worm-like propagation, and kernel-level exploitation, the attackers have created a resilient and highly efficient botnet. The use of the BYOVD technique, in particular, highlights a critical weakness in modern OS security models: the trust placed in signed drivers. As long as legacy drivers with known vulnerabilities remain validly signed and loadable, attackers will continue to use them as keys to the kingdom, bypassing the sophisticated protections of Ring 3 to operate with impunity in the Kernel.

10. Trellix protection and mitigation

Trellix has implemented comprehensive protection and mitigation measures against this cryptojacking campaign and its associated components. Our security solutions include coverage for all known executables, including the malicious controller, the XMRig payload wrapper, and the BYOVD exploit chain. This proactive approach aims to safeguard our customers by detecting the infection at the dropper stage and neutralizing the persistence mechanisms.

11. CISO recommendations: Strengthening defense with Trellix

For security leaders, this campaign underscores the evolving sophistication of commodity malware, particularly in its use of kernel-level exploitation. Trellix customers are currently protected against this threat: our Endpoint Security (ENS), EDR, and Network Security solutions successfully detect and block the associated malicious executables, payloads, and network behaviors.

To further strengthen your organization's resilience against similar future threats, we recommend the following strategic actions:

  • Neutralize the "BYOVD" Vector: While Trellix protects against the malware payload, the root vulnerability lies in signed, legacy drivers. We strongly advise organizations to enforce Microsoft’s Vulnerable Driver Blocklist (via Windows Defender Application Control or HVCI). This prevents known-vulnerable drivers, such as the WinRing0x64.sys used in this campaign, from ever loading into the kernel.
  • Leverage ENS device control: The "worm" component of this campaign relies on physical propagation via USB drives. Ensure your Trellix ENS policies include Device Control measures to automatically scan or restrict removable media, cutting off this lateral movement vector.
  • Unify network & endpoint defense: Capitalize on Trellix Endpoint Security Web Control to block outbound connections to consumer-grade mining pools. Administrators should configure the Block and Allow List policy to explicitly deny access to known mining domains (e.g., xmr-sg.kryptex.network) and enforce Web Category Blocking for high-risk categories. This ensures that even if an infected device enters your network, it cannot monetize hijacked resources.
  • Address the human element: Since the infection vector is socially engineered pirated software, reinforce security awareness training regarding software sourcing.

Appendix A - Indicators of compromise 

SHA256 / Data Description
6bd854762e13e9099752ee67b89f841403167358616110033805fc3f218e4d46 EXPLORER.EXE
11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5 WinRing0.sys
51b98f8fb38e822245a1b22864652d7d091dd2f52424786051cbc8131b7e782b explorer .exe

5936ae20028b79e3ebb58f863960e56f93aed4e7a07f0b39a80205a8a7df5579
Microsoft Compatbility Telemetry.exe
69c8c640f35d3f23f8e2997770833f99652a36c5c9c6f6354b021ba3eab93257 wpsupdate.exe
705e3be6bab0b0773e89de02dc53e4947db65a41d93cfe2b592b43fd3d2f4f74 msedge.exe
bd731032cd5f051724ca56e6bb18c64e51c9b442a80a80e6642a92d3cfbaa4df Kernel32 .dll
ebdfb99d7125311dfa8261bb7a98e2e415d15d67369f923f31fb27e36d446ec9 ksomisc.exe
42DKy5tDGH5MjwWDw2nAj7ZydTsX43cxM5T7zfjPezaEav51eALbqQhDo6ZUgF58tA3s28LnvSTUKTdAZUtqcGXsTBZrDfH Wallet ID
xmr-sg.kryptex.network:8029 URL

Appendix B - Trellix detection signatures

Product Signature
Trellix Endpoint Security (ENS) Trojan-FZTA
Trojan-FZPB
Trojan-FZPE
Trojan-FZPC
Trojan-FZPF
Trojan-FZPG
Trojan-FZPA
Trellix VX Trellix Cloud FE_Tool_Win_XMrig_5 
FE_Trojan_Win_Generic_444
FE_Trojan_Win_Generic_445
FE_Trojan_Win_Generic_446
FE_Trojan_Win_Generic_447
FE_Loader_Win_Generic_182
Trellix Network Security MVX Trellix File Protect Trellix Malware Analysis Trellix SmartVision Trellix Detection As A Service Trellix NX Tool.CoinMiner (86117227)
Tool.CoinMiner (86119921)
Trojan.CoinMiner (86122917)
Tool.Win.XMRig.MVX (21892)
Suspicious File Activity (10081)
Suspicious File Dropper Activity (10048)
Suspicious Process Hijacking Activity (10073)
Suspicious File Manipulation On Known Benign Filenames (10179)
Suspicious Registry on File Dropped (10247)
Suspicious File Self Copy and Persistence (10760)
Riskware Network Activity with cnc Backdoor behavior (50024)

Appendix C - MITRE ATT&CK

Tactical Goal ATT&CK Technique (Technique ID) Description
Initial Access T1204.002 User Execution: Malicious File User downloads and double-clicks the "Office Crack" or utility installer file.
Execution T1059.003
Command and Scripting Interpreter: Windows Command Shell

The watchdogs (msedge.exe, wpsupdate.exe, and ksomisc.exe) execute the controller using shell commands with arguments (e.g., explorer.exe 016).
Persistence T1543.003 Create or Modify System Process: Windows Service

The miner loader creates a kernel-mode driver service named WinRing0_1_2_0 to load the vulnerable WinRing0x64.sys driver.
  T1574.002 Hijack Execution Flow: DLL Side-Loading Microsoft Compatbility Telemetry.exe (Wrapper) loads a malicious DLL named kernel32 .dll from the local directory instead of the system library.
  T1546 Event Triggered Execution: Trap The persistence mechanism relies on a circular "Hydra" loop where Watchdogs (msedge, wpsupdate, ksomisc.exe) constantly re-trigger the main controller explorer.exe.
Privilege Escalation T1134 Access Token Manipulation The malware requests SeDebugPrivilege or uses the vulnerable driver to manipulate process tokens (implied by kernel-level access).
  T1068
Exploitation for Privilege Escalation

The miner uses the "Bring Your Own Vulnerable Driver" (BYOVD) technique, exploiting CVE-2020-14979 in WinRing0x64.sys to gain Ring 0 (Kernel) access.
Defense Evasion T1036.003 Masquerading: Rename System Utilities The malware names its components explorer.exe (User Profile), Microsoft Compatbility Telemetry.exe, and msedge.exe to look like legitimate Windows binaries.

  T1036.006 Masquerading: Space after Filename It uses kernel32 .dll and explorer .exe (Space Trick) to visually deceive users and potentially bypass exact-match string filters.
  T1564.001 Hide Artifacts: Hidden Files and Directories The dropper immediately sets FILE_ATTRIBUTE_HIDDEN and SYSTEM on all dropped payloads (WPS folder, WinRing0, etc.).
  T1112 Modify Registry Modifies HKCR\lnkfile\IsShortcut to hide the shortcut arrow overlay, making malicious LNK files look like legitimate EXEs or documents.
  T1070.004 File Deletion The "Barusu" kill switch (Time Bomb) triggers a cleanup routine that deletes the dropped files to remove forensic evidence.
Discovery T1057 Process Discovery Uses CreateToolhelp32Snapshot to list running processes, identifying targets to kill or to check their own health.


  T1124 System Time Discovery Checks GetLocalTime to trigger the "Time Bomb" logic (Kill switch after Dec 23, 2025).
  T1120 Peripheral Device Discovery Scans for Removable Drives (GetDriveTypeA == 2) to identify targets for the worm module.
Impact T1496 Resource Hijacking The primary goal: Using the victim's CPU to mine Monero (XMR) via the XMRig payload.
  T1489 Service Stop The "Killer" module (explorer .exe) aggressively terminates legitimate explorer.exe

Discover the latest cybersecurity research from the Trellix Advanced Research Center: https://www.trellix.com/advanced-research-center/

This document and the information contained herein describes computer security research for educational purposes only and the convenience of Trellix customers.

Get the latest

Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Please enter a valid email address.

Zero spam. Unsubscribe at any time.