T1074.001
Local Data Staging
Adversaries may stage collected data in a central location or directory on the local system prior to exfiltration. Data may be kept in separate files or combined into one file through archiving techniques. Adversaries commonly use temp directories, hidden folders, or application data paths to aggregate stolen files, credentials, screenshots, keylogger output, and memory dumps before transferring them out. Interactive command shells (cmd.exe, bash) and scripting languages are frequently used to copy and consolidate data into staging locations.
Microsoft Sentinel / Defender
kusto
let StagingPaths = dynamic([
"\\Temp\\", "\\tmp\\", "\\AppData\\Local\\Temp\\",
"\\AppData\\Roaming\\", "\\ProgramData\\",
"\\Windows\\Temp\\", "\\Users\\Public\\",
"\\Recycle", "\\$Recycle.Bin"
]);
let StagingExtensions = dynamic([
".zip", ".rar", ".7z", ".tar", ".gz",
".tmp", ".dat", ".db", ".bak"
]);
let StagingTools = dynamic([
"xcopy", "robocopy", "copy", "move",
"compress", "compact", "tar", "7z",
"rar", "zip"
]);
// Detection 1: Bulk file copy operations into staging paths
let BulkFileCopy = DeviceProcessEvents
| where Timestamp > ago(24h)
| where (
(FileName in~ ("cmd.exe", "powershell.exe", "pwsh.exe") and
ProcessCommandLine has_any (StagingTools) and
ProcessCommandLine has_any (StagingPaths))
or
(FileName in~ ("xcopy.exe", "robocopy.exe") and
ProcessCommandLine has_any (StagingPaths))
)
| extend StagingIndicator = "BulkFileCopy";
// Detection 2: Suspicious file creation in staging paths
let SuspiciousFileCreation = DeviceFileEvents
| where Timestamp > ago(24h)
| where ActionType == "FileCreated"
| where FolderPath has_any (StagingPaths)
| where FileName has_any (StagingExtensions)
| where InitiatingProcessFileName !in~ ("MsMpEng.exe", "svchost.exe", "TiWorker.exe",
"WindowsUpdate", "wuauclt.exe", "msiexec.exe",
"OneDrive.exe", "Teams.exe", "Slack.exe")
| extend StagingIndicator = "SuspiciousFileCreation";
// Detection 3: Redirect operators appending output to files in staging dirs
let OutputRedirect = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("cmd.exe", "powershell.exe", "pwsh.exe", "bash", "sh")
| where ProcessCommandLine matches regex @"(>>|>\s*[""']?)(.*)(\\Temp\\|\\tmp\\|\\ProgramData\\|\\Users\\Public\\)"
| extend StagingIndicator = "OutputRedirect";
union BulkFileCopy, SuspiciousFileCreation, OutputRedirect
| project Timestamp, DeviceName, AccountName,
FileName, ProcessCommandLine, FolderPath,
InitiatingProcessFileName, InitiatingProcessCommandLine,
StagingIndicator
| sort by Timestamp desc medium severity
medium confidence
Data Sources
Process: Process Creation File: File Creation Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents DeviceFileEvents
False Positives
- Backup software or IT tools (Acronis, Veeam, Windows Backup) writing archives to temp directories during scheduled backup jobs
- Software installers and update mechanisms that extract files to %TEMP% or %ProgramData% as part of legitimate installation workflows
- Log aggregation or diagnostic tools that consolidate logs into temp folders for upload to centralized logging systems
- Developer workflows where build systems (MSBuild, CMake, npm) create temporary archives or data files in project directories
Last updated: 2026-04-13 Research depth: deep
References (13)
- https://attack.mitre.org/techniques/T1074/001/
- https://web.archive.org/web/20220629230035/https://www.prevailion.com/darkwatchman-new-fileless-techniques/
- https://unit42.paloaltonetworks.com/unit42-oopsie-oilrig-uses-threedollars-deliver-new-trojan/
- https://www.malwarebytes.com/blog/threat-intelligence/2021/12/sidecopy-apt-connecting-lures-to-victims-payloads-to-infrastructure
- https://www.mandiant.com/resources/roadsweep-ransomware-zerocleare-wiper
- https://www.mandiant.com/resources/blog/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day
- https://securelist.com/my-name-is-dtrack/93338/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1074.001/T1074.001.md
- https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event
- https://www.secureworks.com/research/bronze-union
- https://attack.mitre.org/groups/G0027/
- https://attack.mitre.org/groups/G0053/
- https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
Unlock Pro Content
Get the full detection package for T1074.001 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance