{"id":9063,"date":"2017-09-01T10:40:15","date_gmt":"2017-09-01T18:40:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/01\/news-2836\/"},"modified":"2017-09-01T10:40:15","modified_gmt":"2017-09-01T18:40:15","slug":"news-2836","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/09\/01\/news-2836\/","title":{"rendered":"PowerPoint File Armed with CVE-2017-0199 and UAC Bypass"},"content":{"rendered":"<div class=\"entry\">\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture1.png\" style=\"width: 634px; height: 814px;\" \/><\/p>\n<p>FortiGuard Labs recently discovered a new malicious PowerPoint file named ADVANCED DIPLOMATIC PROTOCOL AND ETIQUETTE SUMMIT.ppsx. Taking a look at the four slides of the PowerPoint Open XML Slide Show (PPSX) file, we can tell that it targets people from UN agencies, Foreign Ministries, International Organizations, and those who interact with international governments.<\/p>\n<p>We will take a look on how opening this PowerPoint file could compromise your system.<\/p>\n<p>Here&rsquo;s an overview on how the attack works:<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture2.png\" style=\"width: 1002px; height: 595px;\" \/><\/p>\n<p align=\"center\"><em>Figure 01: Flow of the attack process<\/em><\/p>\n<h1>CVE-2017-0199<\/h1>\n<p>This exploit targets a vulnerability identified as CVE-2017-0199, which was disclosed and patched last April 2017. It triggers a remote code execution in Microsoft Office or WordPad when parsing specially crafted files. Attackers who successfully exploit this flaw in the Windows Object Linking and Embedding (OLE) interface of Microsoft Office can take control of the affected system. This vulnerability is well <a href=\"https:\/\/blog.fortinet.com\/2017\/06\/04\/an-inside-look-at-cve-2017-0199-hta-and-scriptlet-file-handler-vulnerability\">explained here by Wayne Low<\/a>.<\/p>\n<p>This is not the <a href=\"http:\/\/thehackernews.com\/2017\/08\/powerpoint-malware-ms-office.html\">first time<\/a> we have sees attackers leveraging this vulnerability. We saw it used on a previous malicious PowerPoint Slide Show file that delivered the <a href=\"https:\/\/blog.fortinet.com\/2017\/02\/14\/remcos-a-new-rat-in-the-wild-2\">REMCOS RAT<\/a> malware. However, this attack should not be confused with PowerPoint file exploits that use <a href=\"http:\/\/blog.fortinet.com\/2017\/08\/23\/deep-analysis-of-new-poison-ivy-variant\">mouse over actions<\/a> that leverage the <em>ppaction:\/\/protocol<\/em> to launch a PowerShell command.<\/p>\n<p>When the latest malicious PowerPoint Slide Show is opened, it triggers a script in <em>ppt\/slides\/_rels\/slide1.xml.rels.<\/em> The exploit then downloads the remote code at its <em>Target<\/em> <em>hxxp:\/\/www[.]narrowbabwe[.]net:3345\/exp[.]doc<\/em>, as shown below, and runs it using the PowerPoint Show animations feature. The crafted file also includes a lot of blank space after the <em>Target, <\/em>which could be used to avoid YARA detection. (YARA is a malware research and detection tool.)<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture3.png\" style=\"width: 789px; height: 364px;\" \/><\/p>\n<p align=\"center\"><em>Figure 02: PPSX file leveraging CVE-2017-0199<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>When we observe network traffic when this file is executed, we can see that the specially crafted file successfully exploits the flaw and downloads and executes the file <em>exp.doc<\/em>. This is not a doc file, but an XML file with JavaScript code.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture4.png\" \/><\/p>\n<p align=\"center\"><em>Figure 03: Network traffic from the PPSX file<\/em><\/p>\n<h1>UAC Bypass and Privilege Escalation<\/h1>\n<p>When we extract the JavaScript from the XML file we can see that it will write a file in <em>%Temp%Microsoft_Office_Patch_KB2817430.jse<\/em>. The filename imitates that of the Microsoft Office patch to lower suspicion and try to show it&rsquo;s a legitimate file, which obviously it is not.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture5.png\" style=\"width: 940px; height: 356px;\" \/><\/p>\n<p align=\"center\"><em>Figure 04: Embedded JavaScript in the XML file<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Not only does this sample use an exploit, it also includes an infamous technique to bypass Microsoft Windows&rsquo; UAC security and then execute itself with high privilege. Higher privilege equals more authority and allows more action to the system.<\/p>\n<p>The UAC bypass technique includes hijacking the registry in <em>HKCUsoftwareclassesmscfileshellopencommand <\/em>and then executing <em>eventvwr.exe<\/em>. You can read more on this UAC bypass and privilege escalation technique <a href=\"https:\/\/blog.fortinet.com\/2016\/12\/16\/malicious-macro-bypasses-uac-to-elevate-privilege-for-fareit-malware\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture6.png\" style=\"width: 940px; height: 203px;\" \/><\/p>\n<p align=\"center\"><em>Figure 05: Added registry for UAC bypass<\/em><\/p>\n<h1>JavaScript Analysis<\/h1>\n<p>The dropped <em>Microsoft_Office_Patch_KB2817430.jse <\/em>malware that is executed with high privilege contains the following code.&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture7.png\" style=\"width: 823px; height: 674px;\" \/><\/p>\n<p align=\"center\"><em>Figure 06: Dropped Microsoft_Office_Patch_KB2817430.jse file<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>In the above code, WMI ActiveScriptConsumers is used for persistence. A timer event is also created so the script runs every 12 seconds (12000 milliseconds). The script that runs it is encoded and stored as a comment inside its body.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture8.png\" style=\"width: 671px; height: 492px;\" \/><\/p>\n<p align=\"center\"><em>Figure 07: Decoded script<\/em><\/p>\n<h1>Obtaining the C&amp;C Server from a JPG File<\/h1>\n<p>After decoding the code in the comments, the script reads the following registry, and if they don&rsquo;t exist it will create them.<\/p>\n<p>HKLMSOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsUser AgentSeed0<\/p>\n<p>HKLMSOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsUser AgentFeed0<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture9.png\" style=\"width: 940px; height: 193px;\" \/><\/p>\n<p align=\"center\"><em>Figure 08: Registry Feed0 and Seed0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The data written in the registry key <em>Feed0 <\/em>is hard coded from the <em>Microsoft_Office_Patch_KB2817430.jse<\/em> file. When decoded it has the following value <em>hxxp:\/\/narrowbabwe[.]net\/comsary\/logo[.]<\/em>jpg.<\/p>\n<p>The script proceeds to connect to this URL; however in our analysis it is no longer responding. Trying a quick search in Google, we were able to retrieve the <em>\/logo.jpg<\/em> file thanks to <a href=\"https:\/\/www.virustotal.com\/en\/url\/5c5073f0cd4f6ae8b2305eb410c67df8ad15885260f107630cfdb91ec0ecac7b\/analysis\/\">VirusTotal<\/a>.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture10.png\" style=\"width: 321px; height: 362px;\" \/><\/p>\n<p align=\"center\"><em>Figure 09: Tampered jpg file<\/em><\/p>\n<p>Now that we have the <em>\/logo.jpg<\/em>, we can proceed on analysing the sample. First we noticed there is a corrupted portion of the jpg file. This could mean that the attacker tampered with the original photo to hide some data. This is a very effective technique in hiding a message\/data since jpg files are often assumed to be non-malicious.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture11.png\" style=\"width: 940px; height: 79px;\" \/><\/p>\n<p align=\"center\"><em>Figure 10: Code to retrieve the hidden data<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Checking the code we see that it gets the length of <em>Response_Text<\/em> or the end of file and subtracts it by 0x80h, which could be the start of the encoded data. The &lsquo;if&rsquo; statement compares to a hard-coded marker in the jpg file that has values 9, 5, 2 and 7, as shown above. If this condition is not met it will return nothing.&nbsp; But if the marker is found, it will get the <em>substr<\/em> from the offset <em>i <\/em>with a length of 44 characters, which will be the encoded URL.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture12.png\" style=\"border-width: 0px; border-style: solid; width: 451px; height: 162px;\" \/><\/p>\n<p align=\"center\"><em>Figure 11: Tampered Data<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The encoded URL will be written in the registry <em>\/Seed0,<\/em> and when decoded has a value of <em>hxxp:\/\/www[.]narrowbabwe[.]net\/comsary\/index[.]php<\/em>.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture13.png\" style=\"width: 934px; height: 185px;\" \/><\/p>\n<p align=\"center\"><em>Figure 12: Seed0 Registry key<\/em><\/p>\n<p>&nbsp;<\/p>\n<h1>C&amp;C Communication<\/h1>\n<p>Next, it tries to identify if it is being run in a virtual environment by getting the Network Adapter Configuration and searching to see if there is an occurrence of the string &lsquo;Virtual&rsquo;.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture14.png\" style=\"width: 728px; height: 203px;\" \/><\/p>\n<p align=\"center\"><em>Figure 13: Check for virtual environment<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Interestingly, the data that will be sent depends on whether or not the &lsquo;Virtual&rsquo; string is found. Comparing the two, if the string is not found the gathered data will include <em>&amp;ipaddr<\/em> and <em>&amp;macaddr<\/em> from the infected machine.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture15.png\" style=\"width: 522px; height: 434px;\" \/><\/p>\n<p align=\"center\"><em>Figure 14: Information gathered from machine<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>After collecting the needed information it encodes back the data and sends this by HTTP POST to <em>hxxp:\/\/www[.]narrowbabwe[.]net\/comsary\/index[.]php<\/em>.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture16.png\" style=\"width: 940px; height: 229px;\" \/><\/p>\n<p align=\"center\"><em>Figure 15: HTTP POST to C&amp;C<\/em><\/p>\n<p align=\"center\">&nbsp;<\/p>\n<p>The format of the data being sent is shown below.<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture17.png\" style=\"width: 859px; height: 215px;\" \/><\/p>\n<p align=\"center\"><em>Figure 16: Encoded data to be sent<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Unfortunately, the C&amp;C was already down during our analysis, resulting in no response. However, we can still confirm from the code below that the response from the C&amp;C contains arbitrary commands that are executed with eval() function. These commands can possibly be download functions to deliver the final payload, and the most commonly used malware for espionage are RATs (Remote Access Trojans).<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture18.png\" style=\"width: 940px; height: 221px;\" \/><\/p>\n<p align=\"center\"><em>Figure 17: Command and result execution<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Once the execution of the commands from the C&amp;C is done, it sends a notification back to the server using the following HTTP POST query string format:<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/PPT%202\/Picture19.png\" style=\"width: 940px; height: 79px;\" \/><\/p>\n<p align=\"center\"><em>Figure 18: Command result POST notification<\/em><\/p>\n<h1>Conclusion<\/h1>\n<p>Our analysis revealed that multiple techniques were implemented in this code in order to evade detection and remain effective. Such techniques leverage CVE-2017-0199, UAC bypass and escalation of privilege, multiple embedded encoded scripts, multiple stages of URL connection, and embedding the C&amp;C in a jpg file. This shows how persistent criminals can be when crafting their malicious files.<\/p>\n<p><em>A special thank you for additional analysis goes out to our teammates Tien Phan, Tony Loi, and Joie Salvio<\/em><\/p>\n<h1>Solution<\/h1>\n<ol>\n<li>Apply the patches released by Microsoft in April that covers the CVE-2017-0199 vulnerability.<\/li>\n<li>FortiGuard Antivirus service detects this threat as <em>MSOffice\/Downloader!exploit.CVE20170199<\/em><\/li>\n<li>FortiGuard Web Filtering service blocks all C&amp;C and related URLs.<\/li>\n<li>FortiSandbox rates the PPSX file as High Risk.<\/li>\n<\/ol>\n<p>-= FortiGuard Lion Team =-<\/p>\n<p><strong>IOCs:<\/strong><\/p>\n<p>8e89ae80ea50110244f2293f14615a7699b1c5d2a70415a676aa4588117ad9a7 &ndash; PPSX<\/p>\n<p><strong>CC:<\/strong><\/p>\n<p>hxxp:\/\/www[.]narrowbabwe[.]net\/comsary\/logo[.]jpg<\/p>\n<p>hxxp:\/\/www[.]narrowbabwe[.]net:3345\/exp[.]doc<\/p>\n<p>hxxp:\/\/www[.]narrowbabwe[.]net\/comsary\/index[.]php<\/p>\n<p><a href=\"http:\/\/ftnt.net\/2iT7Mcp%C2%A0\"><i>Sign up<\/i><\/a><i>&nbsp;for weekly Fortinet FortiGuard Labs Threat Intelligence Briefs and stay on top of the newest emerging threats.<\/i><\/p>\n<\/div<br \/><a href=\"https:\/\/blog.fortinet.com\/2017\/09\/01\/powerpoint-file-armed-with-cve-2017-0199-and-uac-bypass\" target=\"bwo\" >https:\/\/blog.fortinet.com\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/images\/Images\/images%202\/images%203\/images%204\/images%205\/images%206\/images%208\/Hex%20blog\/more%20hex\/baidu\/more%20baidu\/cerber\/Mamba\/Axelle%20blog\/PPT%20blog\/Picture1.png\"\/><br \/>FortiGuard Labs recently discovered a new malicious PowerPoint file named ADVANCED DIPLOMATIC PROTOCOL AND ETIQUETTE SUMMIT.ppsx. Taking a look at the four slides of the PowerPoint Open XML Slide Show (PPSX) file, we can tell that it targets people from UN agencies, Foreign Ministries, International Organizations, and those who interact with international governments.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-9063","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9063"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9063\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}