Skip to content
Threat Feed
medium advisory

Detection of Azure Storage Utility Execution via Command Line Interface

Adversaries may leverage Azure Storage utilities like AzCopy and Storage Explorer post-compromise to stage or extract sensitive data from endpoints, blending malicious activity with legitimate cloud traffic.

This threat brief focuses on the anomalous execution of Windows Azure Storage utilities, specifically AzCopy.exe and StorageExplorer.exe, via the command-line interface (CLI). These utilities are designed for large-scale data transfers to and from Azure storage accounts. While legitimate administrative use is common, adversaries can exploit these tools post-compromise to exfiltrate sensitive data or stage files for further malicious activities. This allows attackers to leverage trusted cloud channels, making their actions blend with normal network traffic and evade traditional network-based defenses. Identifying unexpected users, unusual parent processes, or anomalous execution patterns involving these utilities is critical for detecting potential data breaches and unauthorized access attempts.

Attack Chain

  1. Initial access is gained through methods outside the scope of this detection (e.g., phishing, vulnerability exploitation).
  2. The attacker performs reconnaissance on the compromised host to identify sensitive data.
  3. AzCopy.exe or StorageExplorer.exe is executed via the command line.
  4. The attacker configures the Azure Storage utility with appropriate credentials or access tokens, potentially obtained through credential theft.
  5. Data is staged in a local directory to prepare for exfiltration.
  6. The Azure Storage utility uploads the staged data to an attacker-controlled Azure storage account.
  7. The attacker verifies the data transfer to the external Azure storage account.
  8. The exfiltrated data is used for extortion, sale, or further malicious activities.

Impact

Successful exploitation can result in the exfiltration of sensitive data, including intellectual property, financial records, and customer data. This can lead to significant financial losses, reputational damage, and legal liabilities. The use of trusted cloud channels makes detection more challenging, potentially allowing attackers to operate undetected for extended periods.

Recommendation

  • Implement the Sigma rule Azure Storage Utility Execution via Suspicious Parent to detect AzCopy or StorageExplorer execution from unusual parent processes (e.g., scripting engines).
  • Monitor process execution logs for command-line invocations of AzCopy.exe and StorageExplorer.exe as covered by the rule Azure Storage Utility Execution via CLI.
  • Investigate any alerts generated by these rules, paying close attention to the user account, parent process, command-line arguments, and destination Azure storage account.

Detection coverage 2

Azure Storage Utility Execution via CLI

medium

Detects the execution of Azure Storage utilities such as AzCopy and Storage Explorer via the command line.

sigma tactics: exfiltration techniques: T1567.002 sources: process_creation, windows

Azure Storage Utility Execution via Suspicious Parent

high

Detects AzCopy or StorageExplorer execution from unusual parent processes, indicating potential abuse.

sigma tactics: exfiltration techniques: T1567.002 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →