T1114.001

Local Email Collection

Adversaries may target user email on local systems to collect sensitive information. Outlook stores email data in offline data files (.ost) and personal storage table files (.pst), typically located in C:\Users\<username>\AppData\Local\Microsoft\Outlook or C:\Users\<username>\Documents\Outlook Files. Threat actors access, copy, or exfiltrate these files to harvest credentials, reconnaissance data, business intelligence, or email threads for thread-hijacking phishing campaigns. Groups such as APT1, QakBot, Carbanak, and RedCurl have all employed this technique at scale.

Microsoft Sentinel / Defender
kusto
let OutlookDataPaths = dynamic([
    "\\AppData\\Local\\Microsoft\\Outlook\\",
    "\\Documents\\Outlook Files\\"
]);
let TrustedOutlookProcesses = dynamic([
    "outlook.exe", "msoia.exe", "ocpubmgr.exe", "olk.exe",
    "searchindexer.exe", "searchprotocolhost.exe", "msosync.exe"
]);
let StagingPaths = dynamic([
    "\\Windows\\Temp\\", "\\Temp\\", "\\Downloads\\",
    "\\Public\\", "\\ProgramData\\", "\\AppData\\Roaming\\",
    "\\Users\\Public\\"
]);
let SuspiciousCopyProcesses = dynamic([
    "cmd.exe", "powershell.exe", "pwsh.exe", "xcopy.exe",
    "robocopy.exe", "wmic.exe", "forfiles.exe", "7z.exe",
    "winrar.exe", "rar.exe", "zip.exe"
]);
// Branch 1: Non-Outlook processes accessing .pst/.ost files in Outlook directories
let SuspiciousOutlookAccess = DeviceFileEvents
| where Timestamp > ago(24h)
| where FileName endswith ".pst" or FileName endswith ".ost"
| where FolderPath has_any (OutlookDataPaths)
| where not (InitiatingProcessFileName in~ (TrustedOutlookProcesses))
| extend DetectionBranch = "NonOutlookProcessAccessingEmailStore"
| extend RiskScore = iff(InitiatingProcessFileName in~ (SuspiciousCopyProcesses), 3, 1);
// Branch 2: .pst/.ost files written or created outside Outlook directories (staging)
let EmailFileStagedElsewhere = DeviceFileEvents
| where Timestamp > ago(24h)
| where FileName endswith ".pst" or FileName endswith ".ost"
| where ActionType in ("FileCreated", "FileRenamed")
| where not (FolderPath has_any (OutlookDataPaths))
| extend DetectionBranch = "EmailFileCreatedInStagingLocation"
| extend RiskScore = iff(FolderPath has_any (StagingPaths), 3, 2);
// Branch 3: Command-line copy operations explicitly targeting .pst/.ost paths
let CmdLinePstAccess = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("cmd.exe", "powershell.exe", "pwsh.exe", "xcopy.exe", "robocopy.exe", "wmic.exe")
| where ProcessCommandLine has ".pst" or ProcessCommandLine has ".ost"
| where ProcessCommandLine has_any ("copy ", "xcopy ", "robocopy ", "cp ", "move ", "Get-ChildItem", "gci ", "dir ", "ls ", "Compress", "Archive", "Invoke-WebRequest", "curl", "wmic")
| extend DetectionBranch = "CommandLinePstOstOperation"
| extend RiskScore = 2;
union SuspiciousOutlookAccess, EmailFileStagedElsewhere
| project Timestamp, DeviceName, AccountName, ActionType, FileName, FolderPath,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         InitiatingProcessParentFileName, DetectionBranch, RiskScore
| sort by RiskScore desc, Timestamp desc
high severity high confidence

Data Sources

File: File Access File: File Creation Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceFileEvents DeviceProcessEvents

False Positives

  • Backup agents (Veeam, Acronis, Windows Backup, Azure Backup) that enumerate and copy user profile data including Outlook stores — these typically run under service accounts with known parent processes
  • IT migration tools (BitTitan MigrationWiz, PST Capture Tool, Barracuda PST Enterprise) used during Exchange Online migrations to collect and import PST files
  • Antivirus and DLP scanning engines that access .pst/.ost files for content inspection — notably Symantec DLP, Forcepoint, and Microsoft Purview
  • Third-party Outlook add-ins or backup utilities (e.g., MailStore, Mailbird, Stellar OST to PST Converter) that legitimately access offline email stores
  • SearchIndexer.exe or SearchProtocolHost.exe Windows Search indexing — already excluded in TrustedOutlookProcesses but may appear under alternate process names

Unlock Pro Content

Get the full detection package for T1114.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections