{"id":91332,"date":"2023-02-01T11:28:58","date_gmt":"2023-02-01T05:58:58","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91332"},"modified":"2023-06-16T16:51:40","modified_gmt":"2023-06-16T11:21:40","slug":"uncovering-lockbit-blacks-attack-chain-and-anti-forensic-activity","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/uncovering-lockbit-blacks-attack-chain-and-anti-forensic-activity\/","title":{"rendered":"Uncovering LockBit Black&#8217;s Attack Chain and Anti-Forensic Activity"},"content":{"rendered":"<p>Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit group has claimed dominance. The group has adopted new extortion techniques and added a first-of-its-kind bug-bounty program, along with many features, to advance their new leak site. Upon investigation and analysis, we have determined that the new LockBit 3.0 variant has a high infection vector and attack chain exhibiting substantial anti-forensic activity.<\/p>\n<h2><strong>Attack Overview<\/strong><\/h2>\n<p>LockBit&#8217;s new Black variant showed anti-forensic activities which cleared event logs, killed multiple tasks, and deleted services simultaneously. It obtains initial access to the victim&#8217;s network via SMB brute forcing from various IPs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91336 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/lockbit3.drawio.png\" alt=\"\" width=\"505\" height=\"142\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/lockbit3.drawio.png 754w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/lockbit3.drawio-300x84.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/lockbit3.drawio-650x183.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/lockbit3.drawio-304x84.png 304w\" sizes=\"(max-width: 505px) 100vw, 505px\" \/><\/p>\n<p style=\"text-align: center;\"><em><strong>Fig. 1 \u2013 Attack Chain<\/strong><\/em><\/p>\n<p>The sys-internal tool PSEXEC is used to execute malicious BAT files on a single system which were later cleaned off. These files indicate activity related to modifying RDP &amp; authentication settings while disabling antivirus at the same time:<\/p>\n<ul>\n<li>C:\\Windows\\system32\\cmd.exe \/c &#8220;&#8221;openrdp.bat&#8221; &#8220;<\/li>\n<li>C:\\Windows\\system32\\cmd.exe \/c &#8220;&#8221;mimon.bat&#8221; &#8220;<\/li>\n<li>C:\\Windows\\system32\\cmd.exe \/c &#8220;&#8221;auth.bat&#8221; &#8220;<\/li>\n<li>C:\\Windows\\system32\\cmd.exe \/c &#8220;&#8221;turnoff.bat&#8221; &#8220;<\/li>\n<\/ul>\n<p>PSEXEC is also used to spread laterally across the victim&#8217;s network to execute the ransomware payload. The encryption is done using a multi-threaded approach where only shared drives got encrypted. The executed payload must have a valid key passed along with the command-line option &#8216;-pass.&#8217; The encrypted files are appended with the <em>.zbzdbs59d<\/em> extension, which suggests that the builder generates each payload with a random static string.<\/p>\n<h2><strong>Payload Analysis<\/strong><\/h2>\n<p>The ransomware payload is dropped inside the <em>Windows<\/em> directory, where every variant requires a unique key to be passed as an argument. This feature was previously known to be used by other ransomware groups like <em>BlackCat<\/em> and <em>Egregor<\/em>. Even if the name of the payload is changed from &#8216;Lock.exe&#8217; to anything else or put in any other directory, it does not run. The pass key used in this case is <strong>60c14e91dc3375e4523be5067ed3b111<\/strong>.<\/p>\n<p>Let us look at a few stages of the payload below:<\/p>\n<h2><strong>Decrypting Sections<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91337 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/decrypt_func_2.png\" alt=\"\" width=\"633\" height=\"465\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/decrypt_func_2.png 809w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/decrypt_func_2-300x220.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/decrypt_func_2-531x390.png 531w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/decrypt_func_2-768x564.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/decrypt_func_2-789x579.png 789w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig. 2 \u2013 Pseudo code for decrypting PE Sections<\/em><\/strong><\/p>\n<p>The key passed in the argument is taken from the command line and verified. If it passes verification, this key is further processed to obtain a 1-byte key to decrypt specific sections obtained by traversing the PEB structure. The three sections decrypted in memory are \u2013 TEXT, DATA, and PDATA.<\/p>\n<h2><strong>Resolving Obfuscated APIs<\/strong><\/h2>\n<p>Being packed and having only a few imports, Win32 APIs are resolved by decrypting the obfuscated string with XOR using the key <strong>0x3A013FD5<\/strong>, which is again unique to each payload.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91338 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/win32api.png\" alt=\"\" width=\"369\" height=\"50\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/win32api.png 413w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/win32api-300x41.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig. 3 \u2013 Resolving APIs<\/em><\/strong><\/p>\n<h2><strong>Privilege Escalation<\/strong><\/h2>\n<p>When Admin privileges are not present during execution, it uses <strong>CMSTPLUA COM<\/strong> to <a href=\"https:\/\/blogs.quickheal.com\/uac-bypass-using-cmstp\/\">bypass the UAC<\/a> prompt, a legitimate Windows Connection Manager Service. This elevates the rights from the user to the administrator level with another instance of the ransomware payload, terminating the current process.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91339 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/cmlua_1.png\" alt=\"\" width=\"744\" height=\"229\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/cmlua_1.png 1030w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/cmlua_1-300x92.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/cmlua_1-650x200.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/cmlua_1-768x236.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/cmlua_1-789x243.png 789w\" sizes=\"(max-width: 744px) 100vw, 744px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig. 4 \u2013 UAC Bypass using CMSTPLUA<\/em><\/strong><\/p>\n<h2><strong>Anti-Debugging Technique<\/strong><\/h2>\n<p>Threads used for file encryption are hidden from the debugger by calling <strong>NtSetInformationThread<\/strong> Win32 API via <strong>ThreadInformationClass<\/strong> with an undocumented value <strong>0x11<\/strong> that denotes <strong>ThreadHideFromDebugger<\/strong>. This hinders dynamic analysis by not allowing debug information from the current ransomware&#8217;s thread to reach the attached debugger.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91340 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/ntsetinfothread.png\" alt=\"\" width=\"485\" height=\"240\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ntsetinfothread.png 547w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ntsetinfothread-300x149.png 300w\" sizes=\"(max-width: 485px) 100vw, 485px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig. 5 \u2013 Anti-Debugging technique to hide threads<\/em><\/strong><\/p>\n<h2><strong>Anti-Forensic Activity<\/strong><\/h2>\n<p>As part of wiping out its traces, lots of anti-forensic activity is observed where Windows Event Logs are disabled by setting multiple registry subkeys to value 0.<\/p>\n<ul>\n<li><strong>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WINEVT\\Channels\\*<\/strong><\/li>\n<\/ul>\n<p>Specifically, Windows Defender is disabled for evasion. An exhaustive list of <a href=\"https:\/\/sebsauvage.net\/paste\/?b0443b90f3fc5ffc#UomoaFa+vkJS9tcLpJwcH1X38YjfbBZDDf3BBk1abPE=\">Events Cleared<\/a>.<\/p>\n<h2><strong>Service Deletion and Process Termination<\/strong><\/h2>\n<p>Process terminated included <em>SecurityHealthSystray.exe<\/em> and the mutex created during execution was <strong>13fd9a89b0eede26272934728b390e06<\/strong>. Services were enumerated using a pre-defined list and deleted or killed if found on the machine:<\/p>\n<ol>\n<li>Sense<\/li>\n<li>Sophos<\/li>\n<li>Sppsvc<\/li>\n<li>Vmicvss<\/li>\n<li>Vmvss<\/li>\n<li>Vss<\/li>\n<li>Veeam<\/li>\n<li>Wdnissvc<\/li>\n<li>Wscsvc<\/li>\n<li>EventLog<\/li>\n<\/ol>\n<p>A few of the services deleted:<\/p>\n<ul>\n<li>sc stop &#8220;Undelete&#8221;<\/li>\n<li>sc delete &#8220;LTService&#8221;<\/li>\n<li>sc delete &#8220;LTSvcMon&#8221;<\/li>\n<li>sc delete &#8220;WSearch&#8221;<\/li>\n<li>sc delete &#8220;MsMpEng&#8221;<\/li>\n<li>net stop ShadowProtectSvc<\/li>\n<li>C:\\Windows\\system32\\net1 stop ShadowProtectSvc<\/li>\n<\/ul>\n<h2><strong>Tasks Killed<\/strong><\/h2>\n<p>Scheduled tasks are enumerated and deleted, some of which are shown below. An exhaustive list of <a href=\"https:\/\/sebsauvage.net\/paste\/?8531b9e9ff63f646#2I+OdDt1RxWVhkUJ1HFTCj9g8boqMcrpkfU0ESMJ03Y=\">Tasks Killed<\/a>.<\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td>IBM*<\/td>\n<td>PrnHtml.exe*<\/td>\n<td>DriveLock.exe*<\/td>\n<td>MacriumService.exe*<\/td>\n<\/tr>\n<tr>\n<td>sql*<\/td>\n<td>PAGEANT.EXE*<\/td>\n<td>CodeMeter.exe*<\/td>\n<td>ReflectMonitor.exe*<\/td>\n<\/tr>\n<tr>\n<td>vee*<\/td>\n<td>firefox.exe*<\/td>\n<td>DPMClient.exe*<\/td>\n<td>Atenet.Service.exe*<\/td>\n<\/tr>\n<tr>\n<td>sage*<\/td>\n<td>ngctw32.exe*<\/td>\n<td>ftpdaemon.exe*<\/td>\n<td>account_server.exe*<\/td>\n<\/tr>\n<tr>\n<td>mysql*<\/td>\n<td>omtsreco.exe<\/td>\n<td>mysqld-nt.exe*<\/td>\n<td>policy_manager.exe*<\/td>\n<\/tr>\n<tr>\n<td>bes10*<\/td>\n<td>nvwmi64.exe*<\/td>\n<td>sqlwriter.exe*<\/td>\n<td>update_service.exe*<\/td>\n<\/tr>\n<tr>\n<td>black*<\/td>\n<td>Tomcat9.exe*<\/td>\n<td>Launchpad.exe*<\/td>\n<td>BmsPonAlarmTL1.exe*<\/td>\n<\/tr>\n<tr>\n<td>postg*<\/td>\n<td>msmdsrv.exe*<\/td>\n<td>MsDtsSrvr.exe*<\/td>\n<td>check_mk_agent.exe*<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>Shadow Volume Copies Deleted<\/strong><\/h3>\n<p>Volume shadow copies are enumerated using a WMI query and then deleted to prevent system restoration<\/p>\n<ul>\n<li>vssadmin.exe Delete Shadows \/All \/Quiet<\/li>\n<\/ul>\n<h3><strong>Removal of all Active Network Connections<\/strong><\/h3>\n<ul>\n<li>net use * \/delete \/y<\/li>\n<\/ul>\n<h2><strong>Registry Activity<\/strong><\/h2>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td>reg add &#8220;HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System&#8221; \/v legalnoticecaption \/t REG_SZ \/d &#8220;ATTENTION to representatives!!!! Read before you log on&#8221; \/f<\/td>\n<\/tr>\n<tr>\n<td>reg add &#8220;HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System&#8221; \/v legalnoticetext \/t REG_SZ \/d &#8220;Your system has been tested for security and unfortunately your system was vulnerable. We specialize in file encryption and industrial (economic or corporate) espionage. We don&#8217;t care about your files or what you do, nothing personal &#8211; it&#8217;s just business. We recommend contacting us as your confidential files have been stolen and will be sold to interested parties unless you pay to remove them from our clouds and auction, or decrypt your files. Follow the instructions in your system&#8221; \/f<\/td>\n<\/tr>\n<tr>\n<td>reg add &#8220;HKLM\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server&#8221; \/v fDenyTSConnections \/t REG_DWORD \/d 0 \/f<\/td>\n<\/tr>\n<tr>\n<td>reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\LSA \/v RunAsPPL \/t REG_DWORD \/d 0 \/f<\/td>\n<\/tr>\n<tr>\n<td>reg add HKLM\\SYSTEM\\CurrentControlSet\\Control\\SecurityProviders\\WDigest \/v UseLogonCredential \/t REG_DWORD \/d 1 \/f<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Ransom Note<\/strong><\/h2>\n<p>Before encryption, the ransom note is created in every directory except the <em>Program Files<\/em> and the <em>Windows<\/em> directory, which aren\u2019t encrypted. We can see that they have moved the naming convention of ransom notes from \u2018<em>Restore-My-Files.txt<\/em>\u2019 to a static string format \u201c<em>zbzdbs59d.README.txt<\/em>\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91341 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/ransom_note_1.png\" alt=\"\" width=\"854\" height=\"418\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ransom_note_1.png 1887w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ransom_note_1-300x147.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ransom_note_1-650x318.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ransom_note_1-768x376.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ransom_note_1-1536x751.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/ransom_note_1-789x386.png 789w\" sizes=\"(max-width: 854px) 100vw, 854px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig. 6 \u2013 Ransom Note<\/em><\/strong><\/p>\n<p>The ransom note contains instructions to install the TOR browser, links for a chat, and the personal ID unique to the victim to communicate with the attackers. It also includes the threat message to leak the stolen data if the ransom amount is not paid and ends with the warnings as usual. Multiple TOR mirrors for their leak site can be seen in the ransom note, which is used to reduce redundancy.<\/p>\n<h2><strong>File Encryption<\/strong><\/h2>\n<p>Before starting file encryption, a registry key for <em>DefaultIcon<\/em> is created to associate an icon to all the encrypted files. Along with this ICO file (zbzdbs59d.ico), a BMP file is also dropped in the <strong>C:\\ProgramData<\/strong> directory. Files are encrypted by creating multiple threads where each filename is replaced with a random string generated and appending the extension to them. With full encryption completed under 2 minutes it still has the fastest encryption process since LockBit 2.0.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91342 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/encr.png\" alt=\"\" width=\"476\" height=\"481\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/encr.png 498w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/encr-297x300.png 297w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/encr-386x390.png 386w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/encr-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/encr-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/encr-45x45.png 45w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig. 7 \u2013 Encrypted Filenames<\/em><\/strong><\/p>\n<h2><strong>Changing Wallpaper<\/strong><\/h2>\n<p>Finally, the desktop background (different from 2.0 variant) of the victim machine is changed with the <em>systemparametersinfoW<\/em> win32 API, and displays LockBit Black, and instructions to be followed for decryption.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91343 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/02\/wallpaper.png\" alt=\"\" width=\"618\" height=\"272\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/wallpaper.png 1350w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/wallpaper-300x132.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/wallpaper-650x286.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/wallpaper-768x338.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/02\/wallpaper-789x347.png 789w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig. 8 \u2013 Modified Wallpaper<\/em><\/strong><\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>Unprotected systems in the network were brute-forced to run the PSEXEC tool for lateral movement across the systems. This was done to execute LockBit\u2019s latest Black ransomware variant. With LockBit 3.0 introducing its bug bounty program and adopting new extortion tactics, it is mandatory to take\u00a0precautions like downloading applications only from trusted sources, using antivirus for enhanced protection, and avoiding clicking on any links received through email or social media platforms. As threat actors create their own variants from the leaked LockBit Black\u2019s builder, <a href=\"https:\/\/blogs.quickheal.com\/proactive-measures-to-safeguard-against-the-ransomware-menace\/\">proactive measures<\/a> must be taken to stay protected.<\/p>\n<h4><strong>IOCs<\/strong><\/h4>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td><b>MD5<\/b><\/td>\n<td><b>Protection<\/b><\/td>\n<\/tr>\n<tr>\n<td>7E37F198C71A81AF5384C480520EE36E<\/td>\n<td>Ransom.Lockbit3.S28401281<\/p>\n<p>HEUR:Ransom.Win32.InP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><strong>IPs<\/strong><\/h4>\n<p>3.220.57.224<\/p>\n<p>72.26.218.86<\/p>\n<p>71.6.232.6<\/p>\n<p>172.16.116.149<\/p>\n<p>78.153.199.241<\/p>\n<p>72.26.218.86<\/p>\n<p>5.233.194.222<\/p>\n<p>27.147.155.27<\/p>\n<p>192.168.10.54<\/p>\n<p>87.251.67.65<\/p>\n<p>71.6.232.6<\/p>\n<p>64.62.197.182<\/p>\n<p>43.241.25.6<\/p>\n<p>31.43.185.9<\/p>\n<p>194.26.29.113<\/p>\n<p>Jumpsecuritybusiness[.]com<\/p>\n<h2><strong>Subject Matter Experts<\/strong><\/h2>\n<ul>\n<li>Tejaswini Sandapolla<\/li>\n<li>Umar Khan A<\/li>\n<li>Parag Patil<\/li>\n<li>Sathwik Ram Prakki<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit group has claimed dominance. The group has adopted new extortion techniques and added a first-of-its-kind bug-bounty program, along with many features, to advance their new leak site. Upon investigation and analysis, we have determined that the new [&hellip;]<\/p>\n","protected":false},"author":100,"featured_media":91046,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[910],"tags":[1956,1961],"class_list":["post-91332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-quickheal-ransomware-cybersecurity-hacking-ransomwareprevention-threatintelligence","tag-lockbit-3-0"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91332"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91332"}],"version-history":[{"count":9,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91332\/revisions"}],"predecessor-version":[{"id":91361,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91332\/revisions\/91361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91046"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}