Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

UNAPIMON (Dropped) – Malware

April 4, 2024
Reading Time: 4 mins read
in Malware
UNAPIMON (Dropped) – Malware

UNAPIMON

Type of Malware

Dropped

Country of Origin

Unknown

Date of initial activity

Unknown

Targeted Countries

Unknown

Motivation

UNAPIMON employs defense evasion techniques to prevent child processes from being monitored

Attack vectors

Attacks commence with the delivery of a weaponized legitimate VMware Tools-related executable that would facilitate scheduled task creation and batch file distribution, which would allow system data exfiltration and batch file execution to enable UNAPIMON.

Targeted systems

Windows

Associated Groups

Earth Freybug

Overview

Described as a simple yet effective C++-based malware, Unapimon comes with advanced features focused on thwarting detection mechanisms. It utilizes a technique to prevent child processes from being monitored, thus evading detection in sandbox environments. The malware achieves this by leveraging the Detours library, a Microsoft open-source tool, to unhook critical API functions. One notable aspect of Unapimon is its utilization of a service called SessionEnv to load a malicious DLL, enabling the malware to inject itself into critical system processes for defense evasion. Additionally, the malware establishes a backdoor by allowing the Windows command interpreter to execute commands from remote sources, granting attackers remote access to compromised systems.

Techniques Used

UNAPIMON implements evasion tactics to evade monitoring of child processes, elaborated in subsequent sections. It operates as a straightforward DLL malware in C++, devoid of packing or obfuscation, except for a lone string encryption. During loading, it sets up event object synchronization and initiates the hooking thread within the DllMain function. The hooking thread locates the CreateProcessW function from kernel32.dll and installs a hook using Microsoft Detours. This redirection mechanism intercepts calls to CreateProcessW within the loaded process and directs them to the hook function. The hook then invokes the original CreateProcessW with a creation flag of CREATE_SUSPENDED to create a process with its main thread suspended. Subsequently, UNAPIMON duplicates DLL files loaded in the child process to %User Temp%_{5 to 9 random alphabetic characters}.dll, preventing loading errors using LoadLibraryEx with DONT_RESOLVE_DLL_REFERENCES parameter. It verifies the integrity of the copied DLLs against the original, ensuring identical checksums and export table contents. If modifications are detected, it removes them by copying the original code to the remote address. Once all DLL names are processed, UNAPIMON unpatches the exported addresses and unloads the local copies of DLLs, deleting them afterward. Upon unloading, it removes the hook from CreateProcessW, completing its operation. Tools UNAPIMON was noted to use the Detours library for critical API function unhooking and bypassing detection.

Impact

UNAPIMON’s behavior reveals its primary objective: to disable critical API functions within any child process. By thwarting API monitoring through hooking, common in sandboxing systems, UNAPIMON enables malicious child processes to operate undetected. This capability poses a significant risk as it allows malicious activities to occur within systems without triggering alarms or alerts. An intriguing aspect of UNAPIMON is its simplicity and ingenuity. Leveraging established tools like Microsoft Detours demonstrates how readily available resources can be repurposed for malicious intent when creatively applied. This underscores the sophistication and adaptability of modern malware authors, showcasing their ability to innovate within the confines of existing technologies. In a departure from conventional malware behavior, UNAPIMON’s approach to hooking presents a novel challenge for security professionals, highlighting the evolving tactics of threat actors in the cybersecurity landscape.

Significant Malware Campaigns

  • Earth Freybug has been observed using a new malware called UNAPIMON to fly under the radar. (April 2024)
References:
  • China-linked Hackers Deploy New ‘UNAPIMON’ Malware for Stealthy Operations
  • Earth Freybug Uses UNAPIMON for Unhooking Critical APIs
 
Tags: APIC++Detours libraryDLLDroppersEarth Freybugkernel32.dllMalwareMicrosoft open-source toolUNAPIMONWindows
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial