Azure Storage File Create, Access, Delete

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This hunting query will identify where a file is uploaded to Azure File or Blob storage and is then accessed once before being deleted. This activity may be indicative of exfiltration activity.

Attribute Value
Type Hunting Query
Solution GitHub Only
ID 25568c62-414b-4577-acee-5cba9494c232
Tactics Exfiltration
Techniques T1537
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
StorageBlobLogs ?
StorageFileLogs ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
AzureStorageAccount Azure Storage

Solutions: Azure Storage


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries