File name:

CAMSCANNERMARCH2025.bat.exe

Full analysis: https://app.any.run/tasks/8520d057-1abb-4232-91cd-a1db934461b4
Verdict: Malicious activity
Analysis date: March 24, 2025, 14:52:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

F361AA1AD678A1037152D4FDDE3BA9FC

SHA1:

00F0B7AB12C3AA0787DA48579F17879D2DB37FDB

SHA256:

A8C3857A246E30062A32ECC8D556967C9FF5AE01ABFCEE9082B50E8781B5DB48

SSDEEP:

49152:zHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZ7:4AGQX21RBt7QjTmcaTH/vU4do9Pcjq1V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • proximobuccal.exe (PID: 7512)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Starts itself from another location

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Application launched itself

      • proximobuccal.exe (PID: 7512)
    • Executes application which crashes

      • proximobuccal.exe (PID: 7564)
      • proximobuccal.exe (PID: 8124)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 8072)
  • INFO

    • Creates files or folders in the user directory

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • WerFault.exe (PID: 7712)
      • WerFault.exe (PID: 8184)
    • Checks supported languages

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • proximobuccal.exe (PID: 7564)
      • proximobuccal.exe (PID: 8124)
    • Create files in a temporary directory

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • proximobuccal.exe (PID: 7564)
      • proximobuccal.exe (PID: 8124)
    • The sample compiled with english language support

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Reads mouse settings

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
      • proximobuccal.exe (PID: 7512)
      • proximobuccal.exe (PID: 7564)
      • proximobuccal.exe (PID: 8124)
    • Reads the machine GUID from the registry

      • CAMSCANNERMARCH2025.bat.exe (PID: 7488)
    • Autorun file from Startup directory

      • proximobuccal.exe (PID: 7512)
    • Checks proxy server information

      • slui.exe (PID: 7240)
    • Manual execution by a user

      • wscript.exe (PID: 8072)
    • Reads the software policy settings

      • slui.exe (PID: 7240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:17 23:36:08+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 735232
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
11
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start camscannermarch2025.bat.exe proximobuccal.exe svchost.exe no specs proximobuccal.exe svchost.exe no specs werfault.exe no specs wscript.exe no specs proximobuccal.exe svchost.exe no specs werfault.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7240C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7488"C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe" C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\camscannermarch2025.bat.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7512"C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe" C:\Users\admin\AppData\Local\wainable\proximobuccal.exe
CAMSCANNERMARCH2025.bat.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\wainable\proximobuccal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7552"C:\Users\admin\Desktop\CAMSCANNERMARCH2025.bat.exe" C:\Windows\SysWOW64\svchost.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7564"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe
proximobuccal.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\wainable\proximobuccal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7592"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe"C:\Windows\SysWOW64\svchost.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
7712C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7564 -s 728C:\Windows\SysWOW64\WerFault.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
8072"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\proximobuccal.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8124"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe" C:\Users\admin\AppData\Local\wainable\proximobuccal.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\wainable\proximobuccal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
8148"C:\Users\admin\AppData\Local\wainable\proximobuccal.exe" C:\Windows\SysWOW64\svchost.exeproximobuccal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Total events
7 240
Read events
7 240
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
12
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7712WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_proximobuccal.ex_d3f33febe3ecd51c6a6d1c6e37a52a7307852_832803de_8d67aec0-11d2-4aed-b255-d60f7d476693\Report.wer
MD5:
SHA256:
8184WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_proximobuccal.ex_d3f33febe3ecd51c6a6d1c6e37a52a7307852_832803de_0805192f-2821-44f1-bf6b-4438a33f0700\Report.wer
MD5:
SHA256:
7512proximobuccal.exeC:\Users\admin\AppData\Local\Temp\autCD25.tmpbinary
MD5:2453FF956E16B2021AB5D6BDA5E5F78C
SHA256:1574E6065A9E95BB3EE3C699C60241250C56AB54E4504873054588A3E0CCD5C6
7512proximobuccal.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\proximobuccal.vbsbinary
MD5:A4C720E7B9B89BFAD24ECF5022D57BE2
SHA256:25FE59FBF5CF5AC1B5D69A89CF6228DDDAD698E031754893C4700063407DBE31
7488CAMSCANNERMARCH2025.bat.exeC:\Users\admin\AppData\Local\Temp\Hegeleosbinary
MD5:7DD25E85ADFF5F71C8E0836E7EFD44B6
SHA256:A3563BE606F32A2F0584DD19C7635F3F2EA8A160B56DBB7617DAC0F2F3A12539
7488CAMSCANNERMARCH2025.bat.exeC:\Users\admin\AppData\Local\Temp\autC9CA.tmpbinary
MD5:2453FF956E16B2021AB5D6BDA5E5F78C
SHA256:1574E6065A9E95BB3EE3C699C60241250C56AB54E4504873054588A3E0CCD5C6
7564proximobuccal.exeC:\Users\admin\AppData\Local\Temp\autD071.tmpbinary
MD5:2453FF956E16B2021AB5D6BDA5E5F78C
SHA256:1574E6065A9E95BB3EE3C699C60241250C56AB54E4504873054588A3E0CCD5C6
7712WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\proximobuccal.exe.7564.dmpbinary
MD5:DB1B7F91E5265649A40920E311CCF1C4
SHA256:AA08319476A527D62881BA48BBAEC98BE4D0D77020B6CC10CB581E18485B59F9
7712WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD515.tmp.dmpbinary
MD5:D49E098C0202CA9DA66F2A41BBFE4F54
SHA256:959653E87C0543F4E8E4703CA3B919C3D13A71DD08A63A2CD943590416934FF7
7712WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD63E.tmp.WERInternalMetadata.xmlbinary
MD5:8C7DC0EE0418D44ABFA170F0DDF49F76
SHA256:CA6878D8896B75E436C36BE6E4AC2FEEA88765F34DEFCAFBF184717C5C66BFE5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
21
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4268
RUXIMICS.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4268
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4268
RUXIMICS.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7348
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7240
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info