Update Date
01/07/2024

Class: WebToolbar

Toolbars enhance the capabilities of user software and are installed with the user’s consent. They are not malicious. However, some toolbars are installed along with other software components. These toolbars make use of special installers that employ a variety of methods to automatically receive permission to install a toolbar, e.g. flagging an “I agree” option by default. In order to warn users about attempts to install unwanted content, we detect as WebToolbar any toolbars being installed on users’ computers without their permission as well as the associated toolbar installers.

Read more

Platform: Win32

Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.

Family: FunWeb

No family description

Examples

2C83A01876CA6DA4D93A70D4B482290F
78BF2000F8C14AAF8DB20B3D3BD8722D
AF43D3CB7DCAEC2CA3B74188A428D683
972977F4062CB4B1D3FFE47095C151DC
9E4A663299007E24503D33C8B77D7104

Tactics and Techniques: Mitre*

TA0002
Execution

Adversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communication (IPC) component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces. Through COM, a client object can call methods of server objects, which are typically binary Dynamic Link Libraries (DLL) or executables (EXE). Remote COM execution is facilitated by Remote Services such as Distributed Component Object Model (DCOM).


T1559.001
Component Object Model

Adversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communication (IPC) component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces. Through COM, a client object can call methods of server objects, which are typically binary Dynamic Link Libraries (DLL) or executables (EXE). Remote COM execution is facilitated by Remote Services such as Distributed Component Object Model (DCOM).


TA0005
Defense Evasion

Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution.


T1112
Modify Registry

Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution.


* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.