{"id":19698,"date":"2022-07-27T07:00:59","date_gmt":"2022-07-27T15:00:59","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/07\/27\/news-13431\/"},"modified":"2022-07-27T07:00:59","modified_gmt":"2022-07-27T15:00:59","slug":"news-13431","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/07\/27\/news-13431\/","title":{"rendered":"Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 27 Jul 2022 14:00:00 +0000<\/strong><\/p>\n<p>The Microsoft Threat Intelligence Center (MSTIC) and the Microsoft Security Response Center (MSRC) found a private-sector offensive actor (PSOA) using multiple Windows and Adobe 0-day exploits, including one for the recently patched <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22047\">CVE-2022-22047<\/a>, in limited and targeted attacks against European and Central American customers. The PSOA, which MSTIC tracks as KNOTWEED, developed malware called Subzero which was used in these attacks.<\/p>\n<p>This blog details Microsoft\u2019s analysis of the observed KNOTWEED activity and related malware used in targeted attacks against our customers. This information is shared with our customers and industry partners to improve detection of these attacks. Customers are encouraged to expedite deployment of the July 2022 Microsoft security updates to protect their systems against exploits using CVE-2022-22047. Microsoft Defender Antivirus and Microsoft Defender for Endpoint have also implemented detections against KNOTWEED\u2019s malware and tools.<\/p>\n<p>PSOAs, which <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/07\/27\/private-sector-cyberweapons-psoas-knotweed\/\">Microsoft also refers to as cyber mercenaries<\/a>, sell hacking tools or services through a variety of business models. Two common models for this type of actor are access-as-a-service and hack-for-hire. In access-as-a-service, the actor sells full end-to-end hacking tools that can be used by the purchaser in operations, with the PSOA not involved in any targeting or running of the operation. In hack-for-hire, detailed information is provided by the purchaser to the actor, who then runs the targeted operations. Based on observed attacks and news reports, MSTIC believes that KNOTWEED may blend these models: they sell the Subzero malware to third parties but have also been observed using KNOTWEED-associated infrastructure in some attacks, suggesting more direct involvement.<\/p>\n<h2>Who is KNOTWEED?<\/h2>\n<p>KNOTWEED is an Austria-based PSOA named DSIRF. The <a href=\"https:\/\/web.archive.org\/web\/20220713203741\/https:\/dsirf.eu\/about\/\">DSIRF website<\/a> [web archive link] says they provide services<em> \u201cto multinational corporations in the technology, retail, energy and financial sectors<\/em>\u201d and that they have \u201c<em>a set of highly sophisticated techniques in gathering and analyzing information.<\/em>\u201d They publicly offer several services including \u201c<em>an enhanced due diligence and risk analysis process through providing a deep understanding of individuals and entities\u201d <\/em>and <em>\u201chighly sophisticated Red Teams to challenge your company&#8217;s most critical assets.\u201d<\/em><\/p>\n<p>However, <a href=\"https:\/\/www.intelligenceonline.com\/surveillance--interception\/2022\/04\/06\/after-finfisher-s-demise-berlin-explores-cyber-tool-options,109766000-art\">multiple<\/a> <a href=\"https:\/\/www.focus.de\/politik\/vorab-aus-dem-focus-volle-kontrolle-ueber-zielcomputer-das-raetsel-um-die-spionage-app-fuehrt-ueber-wirecard-zu-putin_id_24442733.html\">news<\/a> <a href=\"https:\/\/netzpolitik.org\/2021\/dsirf-wir-enthuellen-den-staatstrojaner-subzero-aus-oesterreich\">reports<\/a> have linked DSIRF to the development and attempted sale of a malware toolset called Subzero. MSTIC found the Subzero malware being deployed through a variety of methods, including 0-day exploits in Windows and Adobe Reader, in 2021 and 2022. As part of our investigation into the utility of this malware, Microsoft\u2019s communications with a Subzero victim revealed that they had not commissioned any red teaming or penetration testing, and confirmed that it was unauthorized, malicious activity. Observed victims to date include law firms, banks, and strategic consultancies in countries such as Austria, the United Kingdom, and Panama. It\u2019s important to note that the identification of targets in a country doesn\u2019t necessarily mean that a DSIRF customer resides in the same country, as international targeting is common.<\/p>\n<p>MSTIC has found multiple links between DSIRF and the exploits and malware used in these attacks. These include command-and-control infrastructure used by the malware directly linking to DSIRF, a DSIRF-associated GitHub account being used in one attack, a code signing certificate issued to DSIRF being used to sign an exploit, and other open-source news reports attributing Subzero to DSIRF.<\/p>\n<h2>Observed actor activity<\/h2>\n<h3>KNOTWEED initial access<\/h3>\n<p>MSTIC found KNOTWEED\u2019s Subzero malware deployed in a variety of ways. In the succeeding sections, the different stages of Subzero are referred to by their Microsoft Defender detection names: <em>Jumplump <\/em>for the persistent loader and <em>Corelump <\/em>for the main malware.<\/p>\n<h4>KNOTWEED exploits in 2022<\/h4>\n<p>In May 2022, MSTIC found an Adobe Reader remote code execution (RCE) and a 0-day Windows privilege escalation exploit chain being used in an attack that led to the deployment of Subzero. The exploits were packaged into a PDF document that was sent to the victim via email. Microsoft was not able to acquire the PDF or Adobe Reader RCE portion of the exploit chain, but the victim\u2019s Adobe Reader version was released in January 2022, meaning that the exploit used was either a 1-day exploit developed between January and May, or a 0-day exploit. Based on KNOTWEED\u2019s extensive use of other 0-days, we assess with medium confidence that the Adobe Reader RCE is a 0-day exploit. The Windows exploit was analyzed by MSRC, found to be a 0-day exploit, and then patched in July 2022 as CVE-2022-22047. Interestingly, there were indications in the Windows exploit code that it was also designed to be used from Chromium-based browsers, although we\u2019ve seen no evidence of browser-based attacks.<\/p>\n<p>The CVE-2022-22047 vulnerability is related to an issue with <a href=\"https:\/\/docs.microsoft.com\/windows\/win32\/sbscs\/activation-contexts\">activation context<\/a> caching in the Client Server Run-Time Subsystem (CSRSS) on Windows. At a high level, the vulnerability could enable an attacker to provide a crafted assembly manifest, which would create a malicious activation context in the activation context cache, for an arbitrary process. This cached context is used the next time the process spawned.<\/p>\n<p>CVE-2022-22047 was used in KNOTWEED related attacks for privilege escalation. The vulnerability also provided the ability to escape sandboxes (with some caveats, as discussed below) and achieve system-level code execution. The exploit chain starts with writing a malicious DLL to disk from the sandboxed Adobe Reader renderer process. The CVE-2022-22047 exploit was then used to target a system process by providing an application manifest with an undocumented attribute that specified the path of the malicious DLL. Then, when the system process next spawned, the attribute in the malicious activation context was used, the malicious DLL was loaded from the given path, and system-level code execution was achieved.<\/p>\n<p>It&#8217;s important to note that exploiting CVE-2022-22047 requires attackers to be able to write a DLL to disk. However, in the threat model of sandboxes, such as that of Adobe Reader and Chromium, the ability to write out files where the attacker <em>cannot<\/em> control the path isn\u2019t considered dangerous. Hence, these sandboxes aren\u2019t a barrier to the exploitation of CVE-2022-22047.<\/p>\n<h4>KNOTWEED exploits in 2021<\/h4>\n<p>In 2021, MSRC received a report of two Windows privilege escalation exploits (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31199\">CVE-2021-31199<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31201\">CVE-2021-31201<\/a>) being used in conjunction with an Adobe Reader exploit (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb21-29.html\">CVE-2021-28550<\/a>), all of which were patched in June 2021. MSTIC was able to confirm the use of these in an exploit chain used to deploy Subzero.<\/p>\n<p>We were later able to link the deployment of Subzero to a fourth exploit, one related to a Windows privilege escalation vulnerability in the Windows Update Medic Service (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36948\">CVE-2021-36948<\/a>), which allowed an attacker to force the service to load an arbitrary signed DLL. The malicious DLL used in the attacks was signed by \u2018DSIRF GmbH\u2019.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"253\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig1-Valid-digital-signature-from-DSIRF.png\" alt=\"A screenshot of the digital signature details tab from the file properties page. The tab states that the digital signature for the file is OK. The name indicated under the signer information portion is DSIRF GmbH.\" class=\"wp-image-118925\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig1-Valid-digital-signature-from-DSIRF.png 375w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig1-Valid-digital-signature-from-DSIRF-300x202.png 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/><figcaption>Figure 1. Valid digital signature from DSIRF on Medic Service exploit DLL<\/figcaption><\/figure>\n<h4>Malicious Excel documents<\/h4>\n<p>In addition to the exploit chains, another method of access that led to the deployment of Subzero was an Excel file masquerading as a real estate document. The file contained a malicious macro that was obfuscated with large chunks of benign comments from the Kama Sutra, string obfuscation, and use of Excel 4.0 macros.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"876\" height=\"195\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2a-Examples-of-KNOTWEED-macro-obfuscation.png\" alt=\"\" class=\"wp-image-118928\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2a-Examples-of-KNOTWEED-macro-obfuscation.png 876w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2a-Examples-of-KNOTWEED-macro-obfuscation-300x67.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2a-Examples-of-KNOTWEED-macro-obfuscation-768x171.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/figure>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"876\" height=\"70\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2b-Examples-of-KNOTWEED-macro-obfuscation.png\" alt=\"Two screenshots of macro code snippet, presenting different examples of how the macro is obfuscated to evade detection. In the first code snippet, text from the Kama Sutra is inserted among the macro code. The second code snippet presents the code of a function where the attacker uses Excel 4 macro for obfuscation.\" class=\"wp-image-118931\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2b-Examples-of-KNOTWEED-macro-obfuscation.png 876w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2b-Examples-of-KNOTWEED-macro-obfuscation-300x24.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig2b-Examples-of-KNOTWEED-macro-obfuscation-768x61.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><figcaption>Figure 2: Two examples of KNOTWEED Excel macro obfuscation<\/figcaption><\/figure>\n<p>After de-obfuscating strings at runtime, the VBA macro uses the <em>ExecuteExcel4Macro<\/em> function to call native Win32 functions to load shellcode into memory allocated using <em>VirtualAlloc<\/em>. Each opcode is individually copied into a newly allocated buffer using <em>memset<\/em> before <em>CreateThread<\/em> is called to execute the shellcode.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"876\" height=\"47\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig3-copying-opcodes.png\" alt=\"A screenshot of a code snippet where the malware copies opcode to a newly allocated buffer.\" class=\"wp-image-118934\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig3-copying-opcodes.png 876w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig3-copying-opcodes-300x16.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig3-copying-opcodes-768x41.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><figcaption>Figure 3: Copying opcodes<\/figcaption><\/figure>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"876\" height=\"47\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig4-Calling-CreateThread.png\" alt=\"A screenshot of a code snippet where the malware calls the CreateThread function to execute the shellcode.\" class=\"wp-image-118937\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig4-Calling-CreateThread.png 876w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig4-Calling-CreateThread-300x16.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig4-Calling-CreateThread-768x41.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><figcaption>Figure 4: Calling CreateThread on shellcode<\/figcaption><\/figure>\n<p>The following section describes the shellcode executed by the macro.<\/p>\n<h3>KNOTWEED malware and tactics, techniques, and procedures (TTPs)<\/h3>\n<h4>Corelump downloader and loader shellcode<\/h4>\n<p>The downloader shellcode is the initial shellcode executed from either the exploit chains or malicious Excel documents. The shellcode&#8217;s purpose is to retrieve the <em>Corelump<\/em> second-stage malware from the actor\u2019s command-and-control (C2) server. The downloader shellcode downloads a JPEG image that contains extra encrypted data appended to the end of the file (past the <em>0xFF 0xD9<\/em> marker that signifies the end of a JPEG file). The JPEG is then written to the user\u2019s <em>%TEMP%<\/em> directory.<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig5-Image-embedded-with-the-KNOTWEED-loader-shellcode-and-Corelump.png\" alt=\"\" class=\"wp-image-118940\" width=\"371\" height=\"233\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig5-Image-embedded-with-the-KNOTWEED-loader-shellcode-and-Corelump.png 742w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig5-Image-embedded-with-the-KNOTWEED-loader-shellcode-and-Corelump-300x188.png 300w\" sizes=\"auto, (max-width: 371px) 100vw, 371px\" \/><figcaption>Figure 5: One of the images embedded with the loader shellcode and Corelump<\/figcaption><\/figure>\n<p>The downloader shellcode searches for a 16-byte marker immediately following the end of JPEG. After finding the marker, the downloader shellcode RC4 decrypts the loader shellcode using the next 16 bytes as the RC4 key. Finally, the loader shellcode RC4 decrypts the <em>Corelump<\/em> malware using a second RC4 key and manually loads it into memory.<\/p>\n<h4>Corelump malware<\/h4>\n<p><em>Corelump <\/em>is the main payload and resides exclusively in memory to evade detection. It contains a variety of capabilities including keylogging, capturing screenshots, exfiltrating files, running a remote shell, and running arbitrary plugins downloaded from KNOTWEED\u2019s C2 server.<\/p>\n<p>As part of installation, <em>Corelump<\/em> makes copies of legitimate Windows DLLs and overwrites sections of them with malicious code. As part of this process, <em>Corelump<\/em> also modifies the fields in the PE header to accommodate the nefarious changes, such as adding new exported functions, disabling <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard\">Control Flow Guard<\/a>, and modifying the image file checksum with a computed value from <em>CheckSumMappedFile.<\/em> These trojanized binaries (<em>Jumplump<\/em>) are dropped to disk in <em>C:WindowsSystem32spooldriverscolor<\/em>, and COM registry keys are modified for persistence (see the Behaviors section for more information on COM hijacking).<\/p>\n<h4>Jumplump loader<\/h4>\n<p><em>Jumplump <\/em>is responsible for loading <em>Corelump <\/em>into memory from the JPEG file in the %TEMP% directory. If <em>Corelump<\/em> is not present, <em>Jumplump<\/em> attempts to download it again from the C2 server. Both<em> Jumplump <\/em>and the downloader shellcode are heavily obfuscated to make analysis difficult, with most instructions being followed by a jmp to another instruction\/jmp combination, giving a convoluted control flow throughout the program.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"551\" height=\"220\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig6-Disassembly-showing-jmp-instructions.png\" alt=\"A screenshot of assembly code presenting the jmp\/instruction obfuscation used in Jumplump malware. \" class=\"wp-image-118943\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig6-Disassembly-showing-jmp-instructions.png 551w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/07\/Fig6-Disassembly-showing-jmp-instructions-300x120.png 300w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/><figcaption>Figure 6: Disassembly showing the jmp\/instruction obfuscation used in Jumplump<\/figcaption><\/figure>\n<h4>Mex and PassLib<\/h4>\n<p>KNOTWEED was also observed using the bespoke utility tools Mex and PassLib. These tools are developed by KNOTWEED and bear capabilities that are derived from publicly available sources. Mex, for example, is a command-line tool containing several red teaming or security plugins copied from GitHub (listed below):<\/p>\n<figure class=\"wp-block-table\">\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/github.com\/jpillora\/chisel\">Chisel<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/ParrotSec\/mimikatz\">mimikatz<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/BloodHoundAD\/SharpHound3\">SharpHound3<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/curl\/curl\">Curl<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/vletoux\/pingcastle\">Ping Castle<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/S3cur3Th1sSh1t\/SharpOxidResolver\">SharpOxidResolver<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/l0ss\/Grouper2\">Grouper2<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/GhostPack\/Rubeus\">Rubeus<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/rvrsh3ll\/SharpPrinter\">PharpPrinter<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/eladshamir\/Internal-Monologue\">Internal Monologue<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/Mr-Un1k0d3r\/SCShell\">SCShell<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/leechristensen\/SpoolSample\">SpoolSample<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/Kevin-Robertson\/Inveigh\">Inveigh<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/GhostPack\/Seatbelt\">Seatbelt<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/FuzzySecurity\/StandIn\">StandIn<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/GhostPack\/Lockless\">Lockless<\/a><\/td>\n<td><a href=\"https:\/\/github.com\/anthemtotheego\/SharpExec\">SharpExec<\/a><\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>PassLib is a custom password stealer tool capable of dumping credentials from a variety of sources including web browsers, email clients, LSASS, LSA secrets, and the Windows credential manager.<\/p>\n<h4>Post-compromise actions<\/h4>\n<p>In victims where KNOTWEED malware had been used, a variety of post-compromise actions were observed:<\/p>\n<ul>\n<li>Setting of <em>UseLogonCredential <\/em>to \u201c1\u201d to enable plaintext credentials:\n<ul>\n<li><em>reg &nbsp;add HKLMSYSTEMCurrentControlSetControlSecurityProvidersWDigest \/v UseLogonCredential \/t REG_DWORD \/d 1 \/f<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Credential dumping via <em>comsvcs.dll<\/em>:\n<ul>\n<li><em>rundll32.exe C:WindowsSystem32comsvcs.dll, MiniDump<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Attempt to access emails with dumped credentials from a KNOTWEED IP address<\/li>\n<li>Using Curl to download KNOTWEED tooling from public file shares such as <em>vultrobjects[.]com<\/em><\/li>\n<li>Running PowerShell scripts directly from a GitHub gist created by an account associated with DSIRF<\/li>\n<\/ul>\n<h3>KNOTWEED infrastructure connections to DSIRF<\/h3>\n<p>Pivoting off a known command-and-control domain identified by MSTIC, acrobatrelay[.]com, <a href=\"https:\/\/community.riskiq.com\/article\/15e1201e\">RiskIQ expanded the view of KNOTWEED&#8217;s attack infrastructure.<\/a> Leveraging unique patterns in the use of SSL certificates and other network fingerprints specific to the group and associated with that domain, RiskIQ identified a host of additional IP addresses under the control of KNOTWEED.&nbsp; This infrastructure, largely hosted by Digital Ocean and Choopa, has been actively serving malware since at least February of 2020 and continues through the time of this writing.<\/p>\n<p>RiskIQ next utilized passive DNS data to determine which domains those IPs resolved to at the time they were malicious. This process yielded several domains with direct links to DSIRF, including <em>demo3[.]dsirf[.]eu<\/em> (the company&#8217;s own website), and several subdomains that appear to have been used for malware development, including <em>debugmex[.]dsirflabs[.]eu<\/em> (likely a server used for debugging malware with the bespoke utility tool Mex) and <em>szstaging[.]dsirflabs[.]eu<\/em> (likely a server used to stage Subzero malware).<\/p>\n<h2>Detection and prevention<\/h2>\n<p>Microsoft will continue to monitor KNOTWEED activity and implement protections for our customers. The current detections and IOCs detailed below are in place and protecting Microsoft customers across our security products. Additional advanced hunting queries are also provided below to help organizations extend their protections and investigations of these attacks.<\/p>\n<h3>Behaviors<\/h3>\n<p><em>Corelump <\/em>drops the<em> Jumplump<\/em> loader DLLs to <em>C:WindowsSystem32spooldriverscolor. <\/em>This is a common directory used by malware as well as some legitimate programs, so writes of PE files to the folder should be monitored.<\/p>\n<p><em>Jumplump<\/em> uses COM hijacking for persistence, modifying COM registry keys to point to the <em>Jumplump<\/em> DLL in <em>C:WindowsSystem32spooldriverscolor<\/em>. Modifications of default system CLSID values should be monitored to detect this technique (e.g., <em>HKLMSOFTWAREClassesCLSID{GUID}InProcServer32 Default<\/em> value). The five CLSIDs used by <em>Jumplump<\/em> are listed below with their original clean values on Windows 11:<\/p>\n<ul>\n<li>{ddc05a5a-351a-4e06-8eaf-54ec1bc2dcea} = &#8220;<em>%SystemRoot%System32ApplicationFrame.dll<\/em>&#8220;<\/li>\n<li>{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d} = &#8220;<em>%SystemRoot%system32propsys.dll<\/em>&#8220;<\/li>\n<li>{4590f811-1d3a-11d0-891f-00aa004b2e24} = &#8220;<em>%SystemRoot%system32wbemwbemprox.dll<\/em>&#8220;<\/li>\n<li>{4de225bf-cf59-4cfc-85f7-68b90f185355} = &#8220;<em>%SystemRoot%system32wbemwmiprvsd.dll<\/em>&#8220;<\/li>\n<li>{F56F6FDD-AA9D-4618-A949-C1B91AF43B1A} = &#8220;<em>%SystemRoot%System32Actioncenter.dll<\/em>&#8220;<\/li>\n<\/ul>\n<p>Many of the post-compromise actions can be detected based on their command lines. Customers should monitor for possible malicious activity such as PowerShell executing scripts from internet locations, modification of commonly abused registry keys such as <em>HKLMSYSTEMCurrentControlSetControlSecurityProvidersWDigest, <\/em>and LSASS credential dumping via minidumps.<\/p>\n<h2>Recommended customer actions<\/h2>\n<p>The techniques used by the actor and described in the Observed actor activity section can be mitigated by adopting the security considerations provided below:<\/p>\n<ul>\n<li>All customers should prioritize patching of <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22047\">CVE-2022-22047<\/a>.<\/li>\n<li>Confirm that Microsoft Defender Antivirus is updated to security intelligence update <strong>1.371.503.0<\/strong> or later to detect the related indicators.<\/li>\n<li>Use the included indicators of compromise to investigate whether they exist in your environment and assess for potential intrusion.<\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/office\/change-macro-security-settings-in-excel-a97c09d2-c082-46b8-b19f-e8621e8fe373\">Change Excel macro security settings<\/a> to control which macros run and under what circumstances when you open a workbook. Customers can also <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/03\/xlm-amsi-new-runtime-defense-against-excel-4-0-macro-malware\/\">stop malicious XLM or VBA macros<\/a> by ensuring runtime macro scanning by Antimalware Scan Interface (<a href=\"https:\/\/docs.microsoft.com\/windows\/win32\/amsi\/antimalware-scan-interface-portal\">AMSI<\/a>) is on. This feature\u2014enabled by default\u2014is on if the Group Policy setting for Macro Run Time Scan Scope is set to \u201cEnable for All Files\u201d or \u201cEnable for Low Trust Files\u201d.<\/li>\n<li>Enable multifactor authentication (MFA) to mitigate potentially compromised credentials and ensure that MFA is enforced for all remote connectivity. <em>Note:<\/em> Microsoft strongly encourages all customers download and use password-less solutions like <a href=\"https:\/\/www.microsoft.com\/account\/authenticator\/\">Microsoft Authenticator<\/a> to secure accounts.<\/li>\n<li>Review all authentication activity for remote access infrastructure, with a particular focus on accounts configured with single factor authentication, to confirm authenticity and investigate any anomalous activity.<\/li>\n<\/ul>\n<h2>Indicators of compromise (IOCs)<\/h2>\n<p>The following list provides IOCs observed during our investigation. We encourage our customers to investigate these indicators in their environments and implement detections and protections to identify past related activity and prevent future attacks against their systems. All sample hashes are available in VirusTotal.<\/p>\n<figure class=\"wp-block-table\">\n<table>\n<thead>\n<tr>\n<th>Indicator<\/th>\n<th>Type<\/th>\n<th>Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>78c255a98003a101fa5ba3f49c50c6922b52ede601edac5db036ab72efc57629<\/td>\n<td>SHA-256<\/td>\n<td>Malicious Excel document and VBA<\/td>\n<\/tr>\n<tr>\n<td>0588f61dc7e4b24554cffe4ea56d043d8f6139d2569bc180d4a77cf75b68792f<\/td>\n<td>SHA-256<\/td>\n<td>Malicious Excel document and VBA<\/td>\n<\/tr>\n<tr>\n<td>441a3810b9e89bae12eea285a63f92e98181e9fb9efd6c57ef6d265435484964<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>cbae79f66f724e0fe1705d6b5db3cc8a4e89f6bdf4c37004aa1d45eeab26e84b<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>fd6515a71530b8329e2c0104d0866c5c6f87546d4b44cc17bbb03e64663b11fc<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>5d169e083faa73f2920c8593fb95f599dad93d34a6aa2b0f794be978e44c8206<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>7f29b69eb1af1cc6c1998bad980640bfe779525fd5bb775bc36a0ce3789a8bfc<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>02a59fe2c94151a08d75a692b550e66a8738eb47f0001234c600b562bf8c227d<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>7f84bf6a016ca15e654fb5ebc36fd7407cb32c69a0335a32bfc36cb91e36184d<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>afab2e77dc14831f1719e746042063a8ec107de0e9730249d5681d07f598e5ec<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>894138dfeee756e366c65a197b4dbef8816406bc32697fac6621601debe17d53<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>4611340fdade4e36f074f75294194b64dcf2ec0db00f3d958956b4b0d6586431<\/td>\n<td>SHA-256<\/td>\n<td>Jumplump malware<\/td>\n<\/tr>\n<tr>\n<td>c96ae21b4cf2e28eec222cfe6ca903c4767a068630a73eca58424f9a975c6b7d<\/td>\n<td>SHA-256<\/td>\n<td>Corelump malware<\/td>\n<\/tr>\n<tr>\n<td>fa30be45c5c5a8f679b42ae85410f6099f66fe2b38eb7aa460bcc022babb41ca<\/td>\n<td>SHA-256<\/td>\n<td>Mex tool<\/td>\n<\/tr>\n<tr>\n<td>e64bea4032cf2694e85ede1745811e7585d3580821a00ae1b9123bb3d2d442d6<\/td>\n<td>SHA-256<\/td>\n<td>Passlib tool<\/td>\n<\/tr>\n<tr>\n<td>acrobatrelay[.]com<em><\/em><\/td>\n<td>Domain<\/td>\n<td>C2<\/td>\n<\/tr>\n<tr>\n<td>finconsult[.]cc<\/td>\n<td>Domain<\/td>\n<td>C2<\/td>\n<\/tr>\n<tr>\n<td>realmetaldns[.]com<\/td>\n<td>Domain<\/td>\n<td>C2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>NOTE:<\/strong> These indicators should not be considered exhaustive for this observed activity.<\/p>\n<h2>Detections<\/h2>\n<h3>Microsoft Defender Antivirus<\/h3>\n<p>Microsoft Defender Antivirus detects the malware tools and implants used by KNOTWEED starting with signature build &nbsp;<strong>1.371.503.0<\/strong> as the following family names:<\/p>\n<ul>\n<li><em>Backdoor:O97M\/JumplumpDropper<\/em><\/li>\n<li><em>Trojan:Win32\/Jumplump<\/em><\/li>\n<li><em>Trojan:Win32\/Corelump<\/em><\/li>\n<li><em>HackTool:Win32\/Mexlib<\/em><\/li>\n<li><em>Trojan:Win32\/Medcerc<\/em><\/li>\n<li><em>Behavior:Win32\/SuspModuleLoad<\/em><\/li>\n<\/ul>\n<h3>Microsoft Defender for Endpoint<\/h3>\n<p>Microsoft Defender for Endpoint customers may see the following alerts as an indication of a possible attack. These alerts are not necessarily an indication of KNOTWEED compromise:<\/p>\n<ul>\n<li><em>COM Hijacking <\/em>&#8211; Detects multiple behaviors, including <em>JumpLump<\/em> malware persistence techniques.<\/li>\n<li><em>Possible privilege escalation using CTF module <\/em>&#8211; Detects a possible privilege escalation behavior associated with CVE-2022-2204; also detects an attempt to perform local privilege escalation by launching an elevated process and loading an untrusted module to perform malicious activities<\/li>\n<li><em>KNOTWEED actor activity detected <\/em>&#8211; Detects KNOTWEED actor activities<\/li>\n<li><em>WDigest configuration change <\/em>&#8211; Detects potential retrieval of clear text password from changes to <em>UseLogonCredential<\/em> registry key<\/li>\n<li><em>Sensitive credential memory read <\/em>&#8211; Detects LSASS credential dumping via minidumps<\/li>\n<li><em>Suspicious Curl behavior <\/em>&#8211; Detects the use of Curl to download KNOTWEED tooling from public file shares<\/li>\n<li><em>Suspicious screen capture activity<\/em> &#8211; Detects <em>Corelump<\/em> behavior of capturing screenshots of the compromised system<\/li>\n<\/ul>\n<h2>Hunting queries<\/h2>\n<h3>Microsoft Sentinel<\/h3>\n<p>The following resources are available to Microsoft Sentinel customers to identify the activity outlined in the blog post.<\/p>\n<p><strong>Microsoft Defender Antivirus detections related to KNOTWEED<\/strong><\/p>\n<p>This query identifies occurrences of Microsoft Defender Antivirus detections listed in this blog post:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/KNOTWEEDAVDetection.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/KNOTWEEDAVDetection.yaml<\/a><\/p>\n<p><strong>File hash IOCs related to KNOTWEED<\/strong><\/p>\n<p>This query identifies matches based on file hash IOCs related to KNOTWEED across a range of common Microsoft Sentinel data sets:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/KNOTWEEDFileHashesJuly2022.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/KNOTWEEDFileHashesJuly2022.yaml<\/a><\/p>\n<p><strong>Domain IOCs related to KNOTWEED<\/strong><\/p>\n<p>This query identifies matches based on domain IOCs related to KNOTWEED across a range of common Microsoft Sentinel data sets:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/KNOTWEEDC2DomainsJuly2022.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/KNOTWEEDC2DomainsJuly2022.yaml<\/a><\/p>\n<p><strong>COM registry key modified to point to Color Profile folder<\/strong><\/p>\n<p>This query identifies modifications to COM registry keys to point to executable files in <em>C:WindowsSystem32spooldriverscolor<\/em>:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/COMRegistryKeyModifiedtoPointtoFileinColorDrivers.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/COMRegistryKeyModifiedtoPointtoFileinColorDrivers.yaml<\/a><\/p>\n<p><strong>PE file dropped in Color Profile folder<\/strong><\/p>\n<p>This query looks for PE files being created in the <em>C:WindowsSystem32spooldriverscolor<\/em> folder:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/DeviceFileEvents\/PEfiledroppedinColorDriversFolder.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/DeviceFileEvents\/PEfiledroppedinColorDriversFolder.yaml<\/a><\/p>\n<p><strong>Abnormally large JPEG downloaded from new source<\/strong><\/p>\n<p>This query looks for downloads of JPEG files from remote sources, where the file size is abnormally large, and not from a common source:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/CommonSecurityLog\/AbnormallyLargeJPEGFiledDownloadedfromNewSource.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/CommonSecurityLog\/AbnormallyLargeJPEGFiledDownloadedfromNewSource.yaml<\/a><\/p>\n<p><strong>Downloading new file using Curl<\/strong><\/p>\n<p>This query looks for new files being downloaded using Curl.<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/MultipleDataSources\/DownloadofNewFileUsingCurl.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/MultipleDataSources\/DownloadofNewFileUsingCurl.yaml<\/a><\/p>\n<p><strong>Suspected <\/strong><strong>credential dumping<\/strong><\/p>\n<p>This query looks for attackers using comsvcs.dll to dump credentials from memory<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SecurityEvent\/SuspectedLSASSDump.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SecurityEvent\/SuspectedLSASSDump.yaml<\/a><\/p>\n<p><strong>Downgrade to <\/strong><strong>plaintext credentials<\/strong><\/p>\n<p>This query looks for registry key being set to enabled plain text credentials<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/SecurityEvent\/WDigestDowngradeAttack.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/SecurityEvent\/WDigestDowngradeAttack.yaml<\/a><\/p>\n<h3>Microsoft 365 Defender advanced hunting<\/h3>\n<p>Microsoft 365 Defender customers can run the following advanced hunting queries to locate IOCs and related malicious activity in their environments.<\/p>\n<p><strong>Microsoft Defender Antivirus detections related to KNOTWEED<\/strong><\/p>\n<p>This query identifies detection of related malware and tools by Microsoft Defender Antivirus:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-AVDetections.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-AVDetections.yaml<\/a><\/p>\n<p><strong>File hash IOCs related to KNOTWEED<\/strong><\/p>\n<p>This query surfaces KNOTWEED file hash IOCs across Microsoft Defender for Endpoint tables:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-FileHashIOCsJuly2022.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-FileHashIOCsJuly2022.yaml<\/a><\/p>\n<p><strong>Domain IOCs related to KNOTWEED<\/strong><\/p>\n<p>This query identifies matches based on domain IOCs related to KNOTWEED against Microsoft Defender for Endpoint device network connections:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-DomainIOCsJuly2022.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-DomainIOCsJuly2022.yaml<\/a><\/p>\n<p><strong>COM registry key modified to point to Color Profile folder<\/strong><\/p>\n<p>This query identifies modifications to COM registry keys to point to executable files in <em>C:WindowsSystem32spooldriverscolor<\/em>:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-COMRegistryKeyModifiedtoPointtoColorProfileFolder.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-COMRegistryKeyModifiedtoPointtoColorProfileFolder.yaml<\/a><\/p>\n<p><strong>PE file dropped in Color Profile folder<\/strong><\/p>\n<p>This query looks for PE files being created in the <em>C:WindowsSystem32spooldriverscolor folder<\/em>:<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-PEFileDroppedinColorProfileFolder.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-PEFileDroppedinColorProfileFolder.yaml<\/a><\/p>\n<p><strong>Downloading new file using Curl<\/strong><\/p>\n<p>This query looks for new files being downloaded using Curl.<\/p>\n<p><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-DownloadingnewfileusingCurl.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Campaigns\/KNOTWEED\/KNOTWEED-DownloadingnewfileusingCurl.yaml<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/27\/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits\/\">Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/27\/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 27 Jul 2022 14:00:00 +0000<\/strong><\/p>\n<p>MSTIC and MSRC disclose technical details of a private-sector offensive actor (PSOA) tracked as KNOTWEED using multiple Windows and Adobe 0-day exploits, including one for the recently patched CVE-2022-22047, in limited and targeted attacks against European and Central American customers. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/27\/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits\/\">Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,27115,22453,24532,27116],"class_list":["post-19698","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-knotweed","tag-microsoft-security-intelligence","tag-microsoft-threat-intelligence-center-mstic","tag-private-sector-offensive-actor-psoa"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19698"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19698\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}