File name:

CAMSCANNERMARCH2025.bat.exe

Full analysis: https://app.any.run/tasks/8520d057-1abb-4232-91cd-a1db934461b4
Verdict: Malicious activity
Analysis date: March 24, 2025, 14:52:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

F361AA1AD678A1037152D4FDDE3BA9FC

SHA1:

00F0B7AB12C3AA0787DA48579F17879D2DB37FDB

SHA256:

A8C3857A246E30062A32ECC8D556967C9FF5AE01ABFCEE9082B50E8781B5DB48

SSDEEP:

49152:zHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZ7:4AGQX21RBt7QjTmcaTH/vU4do9Pcjq1V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • proximobuccal.exe (PID: 7512)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Starts itself from another location

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 8072)
    • Executes application which crashes

      • proximobuccal.exe (PID: 8124)
      • proximobuccal.exe (PID: 7564)
    • Application launched itself

      • proximobuccal.exe (PID: 7512)
  • INFO

    • Reads mouse settings

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • proximobuccal.exe (PID: 8124)
      • proximobuccal.exe (PID: 7564)
    • The sample compiled with english language support

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Checks supported languages

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • proximobuccal.exe (PID: 8124)
      • proximobuccal.exe (PID: 7564)
    • Create files in a temporary directory

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • proximobuccal.exe (PID: 8124)
      • proximobuccal.exe (PID: 7564)
    • Reads the machine GUID from the registry

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Creates files or folders in the user directory

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • WerFault.exe (PID: 7712)
      • WerFault.exe (PID: 8184)
    • Manual execution by a user

      • wscript.exe (PID: 8072)
    • Autorun file from Startup directory

      • proximobuccal.exe (PID: 7512)
    • Checks proxy server information

      • slui.exe (PID: 7240)
    • Reads the software policy settings

      • slui.exe (PID: 7240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:17 23:36:08+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 735232
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
11
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start camscannermarch2025.bat.exe proximobuccal.exe svchost.exe no specs proximobuccal.exe svchost.exe no specs werfault.exe no specs wscript.exe no specs proximobuccal.exe svchost.exe no specs werfault.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7240C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7488"C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe" C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\camscannermarch2025.bat.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7512"C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe" C:\Users\admin\AppData\Local\wainable\proximobuccal.exe
CAMSCANNERMARCH2025.bat.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\wainable\proximobuccal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7552"C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe" C:\Windows\SysWOW64\svchost.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7564"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe
proximobuccal.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\wainable\proximobuccal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7592"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe"C:\Windows\SysWOW64\svchost.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
7712C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7564 -s 728C:\Windows\SysWOW64\WerFault.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
8072"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\proximobuccal.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8124"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe" C:\Users\admin\AppData\Local\wainable\proximobuccal.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\wainable\proximobuccal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
8148"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe" C:\Windows\SysWOW64\svchost.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Total events
7 240
Read events
7 240
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
12
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7712WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_proximobuccal.ex_d3f33febe3ecd51c6a6d1c6e37a52a7307852_832803de_8d67aec0-11d2-4aed-b255-d60f7d476693\Report.wer
MD5:
SHA256:
8184WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_proximobuccal.ex_d3f33febe3ecd51c6a6d1c6e37a52a7307852_832803de_0805192f-2821-44f1-bf6b-4438a33f0700\Report.wer
MD5:
SHA256:
7512proximobuccal.exeC:\Users\admin\AppData\Local\Temp\autCD25.tmpbinary
MD5:2453FF956E16B2021AB5D6BDA5E5F78C
SHA256:1574E6065A9E95BB3EE3C699C60241250C56AB54E4504873054588A3E0CCD5C6
7488CAMSCANNERMARCH2025.bat.exeC:\Users\admin\AppData\Local\Temp\autC9CA.tmpbinary
MD5:2453FF956E16B2021AB5D6BDA5E5F78C
SHA256:1574E6065A9E95BB3EE3C699C60241250C56AB54E4504873054588A3E0CCD5C6
7488CAMSCANNERMARCH2025.bat.exeC:\Users\admin\AppData\Local\Temp\Hegeleosbinary
MD5:7DD25E85ADFF5F71C8E0836E7EFD44B6
SHA256:A3563BE606F32A2F0584DD19C7635F3F2EA8A160B56DBB7617DAC0F2F3A12539
7712WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD63E.tmp.WERInternalMetadata.xmlbinary
MD5:8C7DC0EE0418D44ABFA170F0DDF49F76
SHA256:CA6878D8896B75E436C36BE6E4AC2FEEA88765F34DEFCAFBF184717C5C66BFE5
7512proximobuccal.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\proximobuccal.vbsbinary
MD5:A4C720E7B9B89BFAD24ECF5022D57BE2
SHA256:25FE59FBF5CF5AC1B5D69A89CF6228DDDAD698E031754893C4700063407DBE31
8124proximobuccal.exeC:\Users\admin\AppData\Local\Temp\aut2289.tmpbinary
MD5:2453FF956E16B2021AB5D6BDA5E5F78C
SHA256:1574E6065A9E95BB3EE3C699C60241250C56AB54E4504873054588A3E0CCD5C6
8184WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER26EF.tmp.WERInternalMetadata.xmlbinary
MD5:72B1C780582CFC3B7D7C31AA95A7D4E0
SHA256:3D96B039293AE48FDACDA6075AF184513C07FA84A28F6AFECB11B2372E765BDB
8184WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\proximobuccal.exe.8124.dmpbinary
MD5:3755A89345C8272B3BB06F2B019C1173
SHA256:825879056EF271C0E51C9C0BF298E4CD8E3CEB6CA6CA526C9A9BC2C561B10939
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
21
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4268
RUXIMICS.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4268
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4268
RUXIMICS.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7348
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7240
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info