Skip to main content
Skip to main content
Published Mar 23, 2023 | Updated Jul 16, 2024

HackTool:Win64/GooseEgg.A!dha

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

This is a detection of a hack tool that threat actors drop as a batch script named execute.bat or doit.bat, which launches a GooseEgg executable that gains persistence on the compromised system by adding a scheduled task that runs servtask.bat.

Forest Blizzard (STRONTIUM) has been observed to use GooseEgg for elevating privileges in a target environment. The group does this by exploiting a Windows Print Spooler vulnerability by modifying a JavaScript constraints file and launching it with SYSTEM-level permissions.

GooseEgg is deployed as an embedded malicious DLL file (for example, waygoose23.dll), which is an application launcher that lets threat actors install backdoors, move laterally through compromised networks, and run code remotely.

Read the following blog for details:

Users should take the following steps to mitigate the threat:

  • Apply the security update released on October 11, 2022 for the Print Spooler vulnerability (designated as CVE-2022-38028) exploited by GooseEgg and the updates released on June 8, 2021 and July 1, 2021 for PrintNightmare vulnerabilities (designated as CVE-2021-1675 and CVE-2021-34527, respectively).
  • Stop the Print Spooler service on domain controllers as it isn’t required in domain controller operations.
  • Identify domain controllers with Print Spooler service running by using the built-in security assessment in Microsoft Defender for Identity.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us