ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan

Share:

The China-linked threat actor known as MirrorFace has been attributed to a new spear-phishing campaign mainly targeting individuals and organizations in Japan since June 2024.

The aim of the campaign is to deliver backdoors known as NOOPDOOR (aka HiddenFace) and ANEL (aka UPPERCUT), Trend Micro said in a technical analysis.

“An interesting aspect of this campaign is the comeback of a backdoor dubbed ANEL, which was used in campaigns targeting Japan by APT10 until around 2018 and had not been observed since then,” security researcher Hara Hiroaki said.

It’s worth noting that MirrorFace’s use of ANEL was also documented by ESET last month as part of a cyber attack targeting a diplomatic organization in the European Union using lures related to the World Expo.

MirrorFace, also known as Earth Kasha, is the name given to a Chinese threat actor that’s known for its persistent targeting of Japanese entities. It’s assessed to be a sub-cluster within APT10.

The latest campaign is a departure from the hacking group’s intrusions observed during 2023, which primarily sought to exploit security flaws in edge devices from Array Networks and Fortinet for initial access.

The switch to spear-phishing email messages is intentional, per Trend Micro, and a decision motivated by the fact that the attacks are designed to single out individuals rather than enterprises.

“Additionally, an analysis of the victim profiles and the names of the distributed lure files suggests that the adversaries are particularly interested in topics related to Japan’s national security and international relations,” Hiroaki pointed out.

ANEL and NOOPDOOR Backdoors

The digital missives, sent from either free email accounts or compromised accounts, contain a link to Microsoft OneDrive. They aim to lure recipients into downloading a booby-trapped ZIP archive using themes related to interview requests and Japan’s economic security from the perspective of current U.S.-China relations.

Trend Micro said the contents of the ZIP archive vary depending on the targets, adding it uncovered three different infection vectors that have been used to deliver a malicious dropper dubbed ROAMINGMOUSE –

  • A macro-enabled Word document
  • A Windows shortcut file that executes a self-extracting archive (SFX), which then loads a macro-enabled template document
  • A Windows shortcut file that executes PowerShell responsible for dropping an embedded cabinet archive, which then loads a macro-enabled template document

The macro-enabled document, ROAMINGMOUSE, acts as a dropper for components related to ANEL and ultimately launches the backdoor, while simultaneously incorporating evasion techniques that hide it from security programs and make detection challenging.

One of the modules deployed via the dropper is ANELLDR, a loader that’s designed to execute ANEL in memory. It’s launched using a known method called DLL side-loading, after which it decrypts and runs the final-stage backdoor.

A 32-bit HTTP-based implant, ANEL was actively developed between 2017 and 2018 as a way to capture screenshots, upload/download files, load executables, and run commands via cmd.exe. The 2024 campaign employs an updated version that introduces a new command to run a specified program with elevated privileges.

Furthermore, the attack chains leverage the backdoor to collect information from the infected environments and selectively deploy NOOPDOOR against targets of special interest.

“Many of the targets are individuals, such as researchers, who may have different levels of security measures in place compared to enterprise organizations, making these attacks more difficult to detect,” Hiroaki said. “It is essential to maintain basic countermeasures, such as avoiding opening files attached to suspicious emails.”

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:44 am, Mar 27, 2025
weather icon 8°C
L: 6° | H: 9°
few clouds
Humidity: 83 %
Pressure: 1024 mb
Wind: 5 mph SSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 19%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:46 am
Sunset: 6:24 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
6° | 9°°C 0 mm 0% 9 mph 90 % 1024 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
7° | 12°°C 1 mm 100% 13 mph 93 % 1015 mb 0 mm/h
Sat Mar 29 9:00 pm
weather icon
4° | 12°°C 0 mm 0% 9 mph 78 % 1023 mb 0 mm/h
Sun Mar 30 9:00 pm
weather icon
7° | 17°°C 0 mm 0% 10 mph 82 % 1024 mb 0 mm/h
Mon Mar 31 9:00 pm
weather icon
8° | 15°°C 0 mm 0% 8 mph 86 % 1028 mb 0 mm/h
Today 3:00 am
weather icon
8° | 9°°C 0 mm 0% 4 mph 87 % 1024 mb 0 mm/h
Today 6:00 am
weather icon
8° | 8°°C 0 mm 0% 4 mph 90 % 1023 mb 0 mm/h
Today 9:00 am
weather icon
11° | 11°°C 0 mm 0% 6 mph 69 % 1023 mb 0 mm/h
Today 12:00 pm
weather icon
16° | 16°°C 0 mm 0% 7 mph 51 % 1021 mb 0 mm/h
Today 3:00 pm
weather icon
17° | 17°°C 0 mm 0% 9 mph 47 % 1018 mb 0 mm/h
Today 6:00 pm
weather icon
15° | 15°°C 0 mm 0% 7 mph 60 % 1017 mb 0 mm/h
Today 9:00 pm
weather icon
12° | 12°°C 0 mm 0% 6 mph 78 % 1017 mb 0 mm/h
Tomorrow 12:00 am
weather icon
10° | 10°°C 0 mm 0% 7 mph 82 % 1015 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€81,141.96
-0.77%
Ethereum(ETH)
€1,876.50
-2.93%
Tether(USDT)
€0.93
-0.01%
XRP(XRP)
€2.21
-3.85%
Solana(SOL)
€128.30
-4.51%
USDC(USDC)
€0.93
0.00%
Dogecoin(DOGE)
€0.182540
1.16%
Shiba Inu(SHIB)
€0.000013
2.20%
Pepe(PEPE)
€0.000008
6.16%
Peanut the Squirrel(PNUT)
€0.214428
7.85%
Scroll to Top