How a Montreal-made “social search engine” utility has managed to turn into widely-spread adware, whereas escaping penalties


Wajam Web Applied sciences is a start-up based in December 2008 by Martin-Luc Archambault (a well-known entrepreneur in Quebec) and primarily based in Montreal, Canada. The core product of the corporate is a social search engine utility (i.e. it permits looking by means of the content material shared by your contacts on social networks). Determine 1 illustrates an instance of what Wajam shows when performing a Google search.

The software program itself is free to put in; nevertheless, it generates revenues by means of the show of contextual promoting. Concerning its distribution, a browser extension was initially obtainable from the Wajam official web site till 2014 (see Determine 2), however it’s now primarily distributed utilizing the Pay-Per-Set up (PPI) distribution mannequin. In accordance with the Workplace of the Privateness Commissioner (OPC) of Canada, Wajam has used greater than 50 totally different PPI suppliers between 2011 and 2016. This mannequin has been criticized a number of instances for its utilization of pretend Adobe Flash Participant, antivirus, and lots of different well-liked software program installers to deceive the person, and for the heavy presence of adware and malware within the installers offered.


Historical past and person complaints

The historical past of Wajam as an organization is relatively curious in accordance with the 2017 report of the OPC and a few press investigations (right here and right here in French):

  • The corporate progressively and silently eliminated the power to hyperlink Fb, LinkedIn and Google+ accounts to their software program between 2012 and 2014, though its primary characteristic is dependent upon it.
  • Numerous customers began to complain as of 2012 concerning the heavy show of advertisements within the internet browser and the issue to uninstall Wajam (see Figures 3, 4 and 5). In accordance with D&B Hoovers, the corporate generated round USD 4.2M of internet income in 2013.



  • Whereas the OPC was investigating the corporate for breaching the Private Data Safety and Digital Paperwork Act (PIPEDA) due to its utilization of customers’ private info, the corporate was offered to a newly-created firm headquartered in Hong Kong, known as Iron Mountain Expertise Restricted (IMTL).

The timeline in Determine 6 sums up some outstanding occasions within the historical past of the corporate.


In parallel to the corporate historical past, Determine 7 exposes the timeline of the anti-detection and anti-analysis options added to the software program.


Widespread observations on the totally different variations of Wajam

A number of variations of Wajam have been developed through the years. For the reason that builders used inner names and model numbering to tell apart the totally different variants and builds, it was potential to categorise the gathering of samples collected. The next desk sums up the variations recognized; observe that the dates are primarily based on the time the samples have been noticed within the wild and it’s potential they have been obtainable earlier.

Inside title(s) Main model quantity Kind Interval of distribution
Priam 1 Browser extension Late-2011 to 2014
Wajam Web Enhancer, Wajam Community Enhancer 2 Home windows utility 2013 to 2016
Wajam Internet Enhancer, Social2Search 1 and 9 Home windows utility 2014 to 2017
Wajam Browser Enhancer, Social2Search, SearchAwesome 3, 11 and 13 Home windows utility 2016 to current
SearchPage N/A macOS utility 2017 to current

Visitors injection

Every model of Wajam injects the identical payload into the person’s internet site visitors, so the distinction resides within the approach used to make the interception and the injection. Nonetheless, the strategies they used grew to become an increasing number of much like strategies usually utilized by malware builders. As soon as Wajam is put in on a machine and the net site visitors is able to be intercepted, the software program acts as follows:

  1. It downloads an inventory of supported web sites (see Determine 8) from a distant server; this record maps a site title to the trail of the corresponding JavaScript file to be injected. There are additionally some site-specific settings.

  1. If a URL requested by the person matches one of many patterns (103 within the newest model on the time of writing), it injects the corresponding JavaScript file (see Determine 9). This script performs the injection of contextual promoting and, if the webpage is a search engine, additionally shows tweets equivalent to the search key phrases entered by the person.

  1. Lastly, it tries to replace the record from the Wajam distant server.

Private info leaks

Wajam progressively collected an increasing number of details about its customers, both throughout set up or when the software program runs:

  • Some IDs are used to establish a specific person (see Determine 9);
  • Numerous logs are despatched to Wajam servers through the set up course of to make sure it’s completed correctly (see the community seize in Determine 10);
  • Some info particular to the setup of the person – just like the record of software program put in and the mannequin of the machine – are additionally despatched to the Wajam servers.

Distribution mechanism

Apart from the browser extension, all of the variations have been distributed as NSIS installers by Pay-Per-Set up suppliers. Additionally, the PDB paths present how the builders steadily obfuscated their software program through the years. One can see that the later variations principally have for much longer PDB paths that comprise solely random characters.

Model 12 months PDB Path
1.24 2012 C:UsersguillaumeDesktopbranchesWajamguillaume-installer-ie11-fixClientsExtensionsIE_BHOsourcewajamReleasepriam_bho.pdb
1.0 2014 D:jenkinsworkspacedll_injectionsrcReleasewajam.pdb
2.12 d:jenkinsworkspacewajam-proxy-2.12-special-build-for-avsWJProxyobjx86ReleaseWajamInternetEnhancer.pdb
1.71 2016 D:jenkinsworkspacestable-1.71-updatessrcReleasewajam.pdb
2.40 D:jenkinsworkspacestable-2.40-updatebuild-toolsbrhReleasebrh.pdb
3.5 D:jenkinsworkspacestable-ndi-3.5serviceWin32Releaseservice.pdb
1.75 2017 JTBEFHYO.pdb
9.68 213.pdb
13.14 2018 Okay:ga3ENOmcbYZO5KSWLXp8N8PAW5GqjilgGJGNwpoaCyFgPCryX9i9P5jRrWyaG9wzTAvevv8Co9rukntHIFkVb9h7WLCJhFhGGbCeCm1swYV.pdb
13.14 2019 C:D6IMFxtAMIrsnBhaB8LpY2EgA6h6GILyxnyDwtB6hQ5AYqFBonqUMf6rO3gJCEu6cAFDkjWdwiWFUHutqEywARjkktLo4m0i4r6psP3EHIIy.pdb

Evolution of options

Priam: the browser extension

By 2011 to late 2013, Wajam was distributed as a browser extension. In an internet browser extension, the manifest file describes the webpages to be injected, and the way the JavaScript code is injected into these pages if they’re visited by the person. As one can see in Determine 11, all webpages are matched right here, so the scripts could be probably injected in each webpage visited by the person.


The older variations of the browser extension comprise traces of a display screen seize plugin (see Determine 12) in a DLL accompanying the extension. The latter makes use of both the Netscape Plugin API (for Chrome and Firefox) or a Browser Helper Object (for Web Explorer).


In the identical variations, JavaScript code is used to ship the browser’s bookmarks to Wajam servers. Whether or not it’s screenshots or bookmarks, each can comprise delicate private details about a person and one might surprise what Wajam does with this sort of info. Neither perform is current within the present model of the extension.

As their software program was detected as adware by varied safety merchandise, Wajam first tried to have the detections eliminated by asking the safety distributors immediately (see Figures 13 and 14).




In 2014, we noticed a change in Wajam’s technique. Their software program was not obtainable as a browser extension; its obtain hyperlinks have been faraway from their official web site (wajam[.]com) and a brand new model for Home windows, utilizing the Fiddler internet proxy, was distributed by PPI suppliers.

Among the many options of this new model, essentially the most outstanding ones are:

  • It makes use of the SeDebugPrivilege to start out the primary executable with administrator entry rights.
  • It generates a certificates and provides it to the foundation certificates record to intercept SSL/TLS site visitors and therefore avoids safety warnings when injecting JavaScript code into webpages.
  • It units up a proxy to intercept all internet site visitors and the preferences of put in internet browsers and the Home windows registry is tampered with to make use of the proxy.

Wajam within the Warhammer fantasy

On the identical time WJProxy was noticed, one other model with DLL injection capabilities was discovered within the wild. As a substitute of utilizing a third-party proxy, it injects a DLL into internet browsers with a purpose to hook the capabilities that manipulate non-encrypted site visitors. Determine 15 depicts the useful structure of this model.


Apparently, this model makes use of some obfuscation strategies like string encryption (see Figures 16 and 17).



Additionally, the recordsdata containing the record of supported web sites and the addresses of the capabilities to hook (see Determine 18) are each encrypted (AES-256 CFB). One would possibly observe that the names of those recordsdata (respectively waaaghs and snotlings) is likely to be a reference to the Warhammer fantasy universe. There are additionally different (sub)strings, akin to within the title of the injected DLL, wajam_goblin.dll, and others contained in the binaries, suggesting Wajam’s authors have been excited about fantasy video games or fiction.


Concerning the DLL injection course of itself, it may be achieved in several methods relying on the parameter given to the injector. The next desk sums up the totally different choices.

Possibility flag Approach used to inject the DLL
–set-windows-hook SetWindowsHookEx approach
–inject CreateRemoteThread approach
–manual_mapping_inject Blackbone reminiscence hacking library

As soon as the DLL is injected, the injector checks if the focused course of is an internet browser and in that case makes use of MinHook and the decrypted snotlings file to hook the capabilities manipulating non-encrypted internet site visitors akin to Firefox’s PR_Write, PR_Read, Win32 APIs ship, recv, and so forth.

Because the strategies described above are often employed by malicious software program, Wajam makes use of a number of strategies to guard itself from detection by safety merchandise:

  • It checks the Home windows registry for antivirus keys (see an instance itemizing in Determine 19) and sends any it finds to Wajam servers.

  • Relying on the pattern, the title of the executable is barely modified, akin to WajWEnhance.exe, WaWEn.exe, WebEnhancer.exe, and so forth.
  • From late 2015, a minifilter driver is included to cover the software program’s recordsdata on the disk from all processes besides whitelisted ones (see Determine 20).

  • It frequently modifies itself with patches downloaded from Wajam servers (these are variously RC4- or XOR- encrypted).

Chrome and Firefox have just lately blocked third-party code injections of their respective internet browsers, so this model of Wajam gained’t work anymore if a sufferer makes use of the present model of both of those browsers.

Wajam goes deeper within the kernel

To face new safety mechanisms, one other model of Wajam was launched in mid 2016 that added appreciable new options, together with a NetFilter driver to intercept and inject site visitors immediately into kernel area.


One of many many different adjustments with this model is the safety in opposition to detection:

  • It makes use of heavy code and knowledge obfuscation (see Figures 22 and 23); some strategies seem like the Stunnix C/C++ obfuscator.


  • Provides exclusions to Home windows Defender (-command Add-MpPreference -ExclusionPath within the command line);
  • Units registry entries DontReportInfectionInformation and DontOfferThroughWUAU to 1 that disable the an infection report back to Microsoft and MSRT (Malicious Software program Removing Device) updates, respectively.
  • The executables are signed by certificates whose names are domains belonging to Wajam and alter very frequently (see Figures 24 and 25).


These domains are logos of Wajam in accordance with the Quebec Enterprise Register (see Determine 26). Additionally, a few of the domains (extra examples within the IoCs part) are associated to Montreal road names (like “Adrien Provencher”, “Bernard”, “Mont-Royal”, and so forth.).


SearchPage: Apple-flavored Wajam

Beginning in 2017, new Wajam-authored adware known as SearchPage and concentrating on macOS programs was detected. Evaluation exhibits that it used some domains additionally used within the newest Home windows variations (see Determine 24).


It’s distributed as a macOS utility bundle known as, which installs a Safari plugin and a certificates within the keychain (the foundation certificates placeholder on macOS). This plugin injects site visitors in an identical strategy to the Home windows variations.

One other model present in mid 2018 makes use of mitmproxy (an internet proxy written in Python) as an alternative of the Safari extension to intercept internet site visitors. Determine 28 exhibits how the proxy is used in addition to the presence of the Wajam-registered URL hardcoded within the script.


As this malware has already been documented by MalwareBytes, additional particulars could be discovered of their evaluation.

Implications and takeaways

This analysis reveals that regardless of the switch of possession to a Hong Kong firm, Wajam remains to be very lively and below a number of names, akin to SearchAwesome, Social2Search, SearchPage, and so forth. We suppose that is used to cowl their tracks and increase their presence with the assistance of PPI distribution.

Our evaluation exhibits that the strategies utilized by Wajam to inject site visitors grew to become an increasing number of devious and protracted as newer variations have been launched. They began with a easy browser extension (2011), switched to a proxy technique in late-2013, then from 2014 they immediately injected code into the net browsers to hook community communications capabilities, and at the moment are utilizing a driver to intercept site visitors immediately in kernel area. These a number of adjustments have largely been in response to enhancements within the safety protections constructed into browsers or the OS by means of the years.

Utilizing these sorts of strategies implies there are possibilities to be detected by safety merchandise, and this has occurred to Wajam. Even when the historical past of the corporate exhibits they first tried to ask for detection elimination (2012-2013), they rapidly modified their technique (2014) to preferring the usage of obfuscation, code safety and anti-detection strategies that cover the true conduct of their software program.

The Wajam case reminds us there’s nonetheless a gray space when talking about adware and PUAs (Doubtlessly Undesirable Purposes). Certainly, even when they use strategies to cover their conduct from use

See also  Magic: Duels iPad Review

Leave a Reply

Your email address will not be published.