{"id":91153,"date":"2022-11-11T16:32:59","date_gmt":"2022-11-11T11:02:59","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91153"},"modified":"2023-06-17T16:41:50","modified_gmt":"2023-06-17T11:11:50","slug":"qbot-a-html-smuggling-technique-to-target-victims","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/qbot-a-html-smuggling-technique-to-target-victims\/","title":{"rendered":"QBOT \u2013 A HTML Smuggling technique to target victims"},"content":{"rendered":"<p>QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007. Today, Qbot is still a vicious and persistent threat to organizations and has become one of the leading Banking Trojans globally. Over the years, it has changed its initial techniques to deliver payloads like using VBA macros, Excel 4 macros, VBS files, exploits like Follina, etc. Recently in <a href=\"https:\/\/www.quickheal.co.in\/\">Quick Heal&#8217;s Security Labs<\/a>, we have come across a new technique that QBot leverages for its attack. It is called an &#8220;HTML Smuggling attack.&#8221;<\/p>\n<h3><strong>What is HTML Smuggling attack?<\/strong><\/h3>\n<p>HTML Smuggling is an attack vector in which the attacker smuggles encoded malicious script or payload embedded uniquely. It uses HTML 5 and JavaScript to accomplish its task. There are multiple ways to attack with this technique. Some common techniques are:<\/p>\n<ol>\n<li><strong><strong>Use of anchor tag<br \/>\n<\/strong><\/strong>The HTML anchor tag \u201c&lt;a&gt;\u201d defines a hyperlink that links one page to another. It can create a hyperlink to other web pages, files, locations, or any URL. Also, if we want to download any file hosted on any server, we can use an anchor tag. For example,<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91206 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/11.png\" alt=\"\" width=\"650\" height=\"53\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/11.png 955w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/11-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/11-650x53.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/11-768x63.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/11-789x64.png 789w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/li>\n<li><strong><strong>Use of JavaScript Blob<br \/>\n<\/strong><\/strong>JavaScript blobs are objects that are a collection of bytes that contain data stored in a file. Blob data is stored in the user\u2019s memory. This collection of bytes is used in the same places where an actual file would have been used. In other words, blobs can be used to construct file-like objects on the client that can be passed to JavaScript APIs that expect URLs.For example, the bytes of the file payload.exe can be provided as input in JS code as a JS blob; it can be compiled and downloaded at the user end.<\/li>\n<li><strong><strong>Use of embed element<br \/>\n<\/strong><\/strong>It is used for embedding external applications, which are generally multimedia content like audio or video, into an HTML document. It is used as a container for embedding plug-ins such as flash animations.<\/li>\n<\/ol>\n<h3><strong>Why is this technique used?<\/strong><\/h3>\n<p>When the victim opens the HTML attachment, it decodes embedded files and saves them locally. Due to encoded patterns, no malicious content passes through the network, bypassing network filters and <a href=\"https:\/\/blogs.quickheal.com\/malicious-malware-impacting-reviews-and-ratings-of-application\/\">firewalls<\/a>; hence this attack method is gaining popularity among cybercriminals.<\/p>\n<h4><strong>QBot Attack Flow:<\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91190 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/final.png\" alt=\"\" width=\"618\" height=\"229\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/final.png 882w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/final-300x111.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/final-650x241.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/final-768x285.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/final-789x293.png 789w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>In one of the documents we analyzed, an embedded HTML element was found to be created with <em><i>the \u201cdocument.createElement\u201d<\/i><\/em>\u00a0method. Attackers took advantage of this tag to distribute payloads in zip archives. We can see in the below image base64 encoded data for the zip file:-<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91191 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/1.png\" alt=\"\" width=\"658\" height=\"227\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/1.png 1405w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/1-300x104.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/1-650x224.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/1-768x265.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/1-789x272.png 789w\" sizes=\"(max-width: 658px) 100vw, 658px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.1- HTML Smuggling Template<\/em><\/p>\n<p>While opening an HTML file, it tricks the user as if it is downloading a zip file, whereas the zip is already embedded in an HTML file. The password is highlighted in the image below, \u201cabc555\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91193 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/2.png\" alt=\"\" width=\"684\" height=\"311\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/2.png 1415w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/2-300x136.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/2-650x295.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/2-768x349.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/2-789x359.png 789w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.2 &#8211; Zip Download<\/em><\/p>\n<p>After extracting the zip file, we get the\u201dREJ_2975\u201d disk image file, which again contains several files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91194 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/3.png\" alt=\"\" width=\"650\" height=\"479\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/3.png 755w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/3-300x221.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/3-529x390.png 529w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.3 &#8211; Extracted files from iso<\/em><\/p>\n<p>Shortcut file \u201cREJ\u201d is then responsible for conducting the further attack. This file\u2019s task is to execute the \u201creprocesses\u201d command script in the \u201coslo\u201d folder. Subsequently, the command script will execute the final QBot loader DLL file having the name \u201ccounteractively.dat\u201d as shown in the following figure:-<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91195 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/4.png\" alt=\"\" width=\"696\" height=\"257\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/4.png 834w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/4-300x111.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/4-650x240.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/4-768x284.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/4-789x291.png 789w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.4 &#8211; Execution Commands<\/em><\/p>\n<p>Later, the payload is injected in wermgr.exe via process hollowing:-<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91196 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/5.png\" alt=\"\" width=\"555\" height=\"110\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/5.png 555w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/5-300x59.png 300w\" sizes=\"(max-width: 555px) 100vw, 555px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.5 &#8211; Execution Commands<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>DLL Analysis:<\/strong><\/h4>\n<p>This Qbot loader DLL is an x32 bit Delphi compiled binary with no export functions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91197 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/6.png\" alt=\"\" width=\"451\" height=\"282\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/6.png 451w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/6-300x188.png 300w\" sizes=\"(max-width: 451px) 100vw, 451px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 6- QBot loader information<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Defense Evasion checks are being used by Qbot; in this case, it is for windows defender simulation by checking the file \u201cC:\\INTERNAL\\__empty.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91199 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/7.png\" alt=\"\" width=\"701\" height=\"56\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/7.png 1543w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/7-300x24.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/7-650x52.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/7-768x61.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/7-1536x122.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/7-789x63.png 789w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 7 &#8211; QBot checking Windows Defender<\/em><\/p>\n<h4><strong>Gaining Persistence:<\/strong><\/h4>\n<p>Qbot uses registry entries and self-replication to attain persistence. As the payload gets executed, the Qbot gains its persistence in 2 steps:<\/p>\n<ol>\n<li>Copying itself to the below-mentioned folder:<br \/>\n%AppData%\\Roaming\\Microsoft\\{RandomStrings}<\/li>\n<li>\u00a0Creating a registry value pointing to the above payload<\/li>\n<\/ol>\n<p>Folder Creation and Dropped DLLs are loaded via regsvr32.exe, as shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91200 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/8.png\" alt=\"\" width=\"552\" height=\"162\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/8.png 552w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/8-300x88.png 300w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 8- Folder Creation with a random name<\/em><\/p>\n<p>Dumping config data in Registry. In the latest payload versions, Qbot has moved from creating its config file in \u201c.dat\u201d format. Now, it writes its cloned DLL entry in the victim as encrypted registry keys to the \u2018HKCU\\Software\\Microsoft\\[RandomString]\u2019 Hive.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91201 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/9.png\" alt=\"\" width=\"678\" height=\"298\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/9.png 1129w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/9-300x132.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/9-650x286.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/9-768x338.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/9-789x347.png 789w\" sizes=\"(max-width: 678px) 100vw, 678px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 9 &#8211; Registry Entries<\/em><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>C2 Communication: <\/strong><\/h4>\n<p>As shown in the following figure, injected process \u201cwermgr.exe\u201d is making a connection to hardcoded Ips:-<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91202 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/11\/10.png\" alt=\"\" width=\"502\" height=\"274\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/10.png 502w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/11\/10-300x164.png 300w\" sizes=\"(max-width: 502px) 100vw, 502px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 10 &#8211; C2 Communication IPs<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion:<\/strong><\/h3>\n<p>Disabling JavaScript in most environments is not feasible as too many legitimate systems and web applications require its use. In addition to that, many legitimate JavaScript frameworks make use of obfuscation techniques in order to minimize file sizes and improve the speed of web applications. Hence blocking obfuscated JavaScript is not a practical option. Therefore, users are advised to take utmost care while handling suspicious emails with HTML attachments. Quick Heal customers are already protected from these <a href=\"https:\/\/www.simplilearn.com\/tutorials\/cyber-security-tutorial\/types-of-cyber-attacks\">types of attacks<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>IoCs:<\/strong><\/h3>\n<p>Html attachment<\/p>\n<p>Md5: 6783003a0737331c66a0b8fc0a35754d<\/p>\n<p>Detection name: HTML.QBot.47153<\/p>\n<p>&nbsp;<\/p>\n<p>QBot loader DLL<\/p>\n<p>MD5: 52EC63A6F7F089862E648112FE8E9F1D<\/p>\n<p>Detection name: Trojan.Qakbot<\/p>\n<h3><strong>URLs:<\/strong><\/h3>\n<p>http:\/\/156.221.50.70:995<\/p>\n<p>http:\/\/190.26.159.108:995<\/p>\n<p>https:\/\/82.205.9.83<\/p>\n<p>https:\/\/14.54.83.74<\/p>\n<p>http:\/\/190.199.186.80:2222<\/p>\n<p>https:\/\/134.35.3.115<\/p>\n<p>https:\/\/176.44.119.201<\/p>\n<p>https:\/\/45.160.33.131<\/p>\n<p>http:\/\/37.245.136.224:2222<\/p>\n<p>https:\/\/132.251.244.3<\/p>\n<p>http:\/\/206.1.216.174<\/p>\n<p>https:\/\/1.20.185.200<\/p>\n<p>http:\/\/196.89.213.210:995<\/p>\n<p>http:\/\/182.183.211.179:995<\/p>\n<p>https:\/\/163.182.177.140<\/p>\n<p>http:\/\/190.26.159.29:995<\/p>\n<p>https:\/\/197.205.161.175<\/p>\n<p>http:\/\/91.171..72.224:32100<\/p>\n<p>http:\/\/101.109.135.92:995<\/p>\n<p>https:\/\/41.97.56.148<\/p>\n<p>https:\/\/14.246.151.165<\/p>\n<p>https:\/\/94.36.5.99<\/p>\n<p>https:\/\/186.18.210.235<\/p>\n<p>https:\/\/79.155.159.202<\/p>\n<p>http:\/\/190.204.112.15:2222<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>MITRE Mapping:<\/strong><\/h3>\n<table style=\"height: 719px;\" width=\"606\">\n<tbody>\n<tr>\n<td width=\"155\"><strong>MITRE ID<\/strong><\/td>\n<td width=\"510\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1566<\/b><\/strong><\/td>\n<td width=\"510\">Phishing<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1027.006<\/b><\/strong><\/td>\n<td width=\"510\">HTML Smuggling<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1553.005<\/b><\/strong><\/td>\n<td width=\"510\">Mark of the web bypass<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1574.002<\/b><\/strong><\/td>\n<td width=\"510\">DLL Sideloading<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1055<\/b><\/strong><\/td>\n<td width=\"510\">Process Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1112<\/b><\/strong><\/td>\n<td width=\"510\">Modify Registry<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1027<\/b><\/strong><\/td>\n<td width=\"510\">Obfuscated Files or Information<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1218.010<\/b><\/strong><\/td>\n<td width=\"510\">System Binary Proxy Execution: Regsvr32<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1010<\/b><\/strong><\/td>\n<td width=\"510\">Application Window Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1082<\/b><\/strong><\/td>\n<td width=\"510\">System Information Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"155\"><strong><b>T1071.001<\/b><\/strong><\/td>\n<td width=\"510\">Application Layer Protocol: Web Protocols<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><strong>Subject Matter Experts:<\/strong><\/h3>\n<p><strong>Anjali Raut<\/strong><\/p>\n<p><strong>Nihar Deshpande<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007. Today, Qbot is still a vicious and persistent threat to organizations and has become one of the leading Banking Trojans globally. Over the years, it has changed its initial techniques to deliver payloads like using VBA macros, [&hellip;]<\/p>\n","protected":false},"author":62,"featured_media":91211,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,1611,24,303,910,5],"tags":[1934,1935,1937,1933,1910,1925,1362,58,1939,1940,247,1503,49,25,1941,1923,61,40],"class_list":["post-91153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-banking-trojan","category-malware","category-phishing","category-ransomware","category-security","tag-bankingtrojan","tag-financialfraud","tag-htmlsmuggling","tag-pinkslipbot","tag-qbot","tag-cyberawareness","tag-cybercrime","tag-hacking","tag-hmtl-smuggling","tag-html-attack","tag-javascript","tag-malspam","tag-malware","tag-phishing","tag-quackbot","tag-quickheal","tag-smartphone-security","tag-trojan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91153"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91153"}],"version-history":[{"count":12,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91153\/revisions"}],"predecessor-version":[{"id":91752,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91153\/revisions\/91752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91211"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}