MCADDF

[COLLECT-EMAIL-002]: Outlook Mailbox Export

Metadata

| Attribute | Details | |—|—| | Technique ID | COLLECT-EMAIL-002 | | MITRE ATT&CK v18.1 | Local Email Collection (T1114.001) | | Tactic | Collection | | Platforms | Windows endpoint with Outlook (M365 Apps / Outlook 2013+), M365 backend mailbox | | Severity | High | | Technique Status | ACTIVE (local PST export fully supported; detection and controls vary) | | Last Verified | 2024-09-30 | | Affected Versions | Outlook 2013, 2016, 2019, Microsoft 365 Apps on Windows 10/11; Exchange Online / on‑prem Exchange as mailbox source | | Patched In | N/A – feature working as designed; risk mitigated via DLP, rights management, and endpoint controls | | Environment | M365 | | Author | SERVTEPArtur Pchelnikau |


2. EXECUTIVE SUMMARY

Operational Risk

Compliance Mappings

| Framework | Control / ID | Description | |—|—|—| | CIS Benchmark | CIS Microsoft 365 / Windows Endpoint Hardening | Failure to control PST export and removable storage allows uncontrolled copies of regulated communications. | | DISA STIG | MS Outlook / Windows 10 STIG – removable media, data at rest | Weak control of local mail stores and USB usage conflicts with DoD data handling requirements. | | CISA SCuBA | Endpoint & SaaS data exfiltration safeguards | Lack of DLP and EDR around PST/OST files undermines secure baseline guidance. | | NIST 800-53 | AC-3, MP-5, SC-28 | Inadequate access control and media protection for local email archives. | | GDPR | Art. 5, Art. 32 | Exporting full mailboxes to unmanaged PSTs breaches data minimization and security of processing. | | DORA | Art. 9 | Uncontrolled export of regulated communications violates ICT security and monitoring obligations. | | NIS2 | Art. 21 | Lack of technical and organizational measures to control offline copies of critical communications. | | ISO 27001 | A.5, A.8.12, A.8.14, A.8.16 | Missing controls for removable media, local storage of sensitive information and endpoint hardening. | | ISO 27005 | Insider data exfiltration via local email archives | High‑impact insider threat scenario requiring explicit treatment.

3. TECHNICAL PREREQUISITES

Supported Versions:

4. ENVIRONMENTAL RECONNAISSANCE

PowerShell Reconnaissance (Local Endpoint)

# List Outlook data files for current user
$paths = @(
  "$env:USERPROFILE\Documents\Outlook Files",
  "$env:LOCALAPPDATA\Microsoft\Outlook"
)

Get-ChildItem -Path $paths -Filter *.pst -Recurse -ErrorAction SilentlyContinue |
  Select-Object FullName, Length, LastWriteTime

Get-ChildItem -Path $paths -Filter *.ost -Recurse -ErrorAction SilentlyContinue |
  Select-Object FullName, Length, LastWriteTime

What to Look For:

Version Note:

Linux/Bash / CLI Reconnaissance (Remote Collection via SMB)

# From a Linux host with access to user profile shares
find /mnt/usershares -iname "*.pst" -o -iname "*.ost" -size +100M

What to Look For:

5. DETAILED EXECUTION METHODS AND THEIRS STEPS

METHOD 1 – Outlook GUI Export to PST

Supported Versions: Outlook 2013–2019, Microsoft 365 Apps.

Step 1: Launch Export Wizard

Objective: Start the Outlook Import/Export wizard.

Command / Actions:

Expected Output:

What This Means:

Step 2: Select Mailbox and Destination

Objective: Export entire mailbox (or selected folders) into PST.

Actions:

  1. In the wizard, choose Outlook Data File (.pst)Next.
  2. Select the root mailbox and tick Include subfolders.
  3. Click Next, choose a destination folder (for example, C:\Users\Public\Exports\user_mailbox.pst).
  4. Choose handling for duplicates and click Finish.
  5. Optionally set a PST password (attackers typically leave this blank).

Expected Output:

OpSec & Evasion:

Troubleshooting:

References & Proofs:

METHOD 2 – Direct Copy of OST/PST for Later Processing

Supported Versions: All Outlook on Windows with cached mode.

Step 1: Identify Data Files

Objective: Locate mailbox cache and archive files on disk.

Command:

$paths = @(
  "$env:USERPROFILE\Documents\Outlook Files",
  "$env:LOCALAPPDATA\Microsoft\Outlook"
)
Get-ChildItem -Path $paths -Include *.pst,*.ost -Recurse -ErrorAction SilentlyContinue

Step 2: Stage and Compress

Objective: Stage files for exfiltration.

Command:

$src = "$env:LOCALAPPDATA\Microsoft\Outlook"
$dst = 'C:\Temp\OutlookDump'
New-Item -ItemType Directory -Path $dst -Force | Out-Null

Copy-Item -Path (Join-Path $src '*.ost') -Destination $dst -Force
Compress-Archive -Path "$dst\*" -DestinationPath 'C:\Temp\mailbackup.zip' -Force

Expected Output:

OpSec & Evasion:

Troubleshooting:

References & Proofs:

6. ATTACK SIMULATION & VERIFICATION

Atomic Red Team

7. TOOLS & COMMANDS REFERENCE

Outlook Import/Export Wizard

Supported Platforms: Outlook on Windows.

Usage:

Script (One-Liner) – PST/OST Discovery

Get-ChildItem "$env:USERPROFILE" -Include *.pst,*.ost -Recurse -ErrorAction SilentlyContinue `
  | Sort-Object Length -Descending `
  | Select-Object -First 20 FullName, Length

8. SPLUNK DETECTION RULES

Rule 1: Large PST/OST Creation on Endpoints

Rule Configuration:

SPL Query (Sysmon example):

index=endpoint sourcetype=sysmon (TargetFilename="*.pst" OR TargetFilename="*.ost")
| stats latest(_time) AS last_seen, values(Image) AS processes, values(User) AS users, sum(FileSize) AS total_bytes BY TargetFilename
| where total_bytes > 500000000

9. MICROSOFT SENTINEL DETECTION

Query 1: Local PST Creation (via Defender for Endpoint data)

Rule Configuration:

KQL Query:

DeviceFileEvents
| where FileName endswith '.pst' or FileName endswith '.ost'
| summarize TotalSize = max(FileSize),
            Processes = make_set(InitiatingProcessFileName),
            Hosts      = make_set(DeviceName)
  by FileName, FolderPath, bin(Timestamp, 1h)
| where TotalSize > 500000000

10. WINDOWS EVENT LOG MONITORING

11. SYSMON DETECTION PATTERNS

<RuleGroup name="PST Creation" groupRelation="or">
  <FileCreate onmatch="include">
    <TargetFilename condition="ends with">.pst</TargetFilename>
    <TargetFilename condition="contains">Outlook Files</TargetFilename>
  </FileCreate>
</RuleGroup>

12. MICROSOFT DEFENDER FOR CLOUD / M365 DEFENDER

13. MICROSOFT PURVIEW (UNIFIED AUDIT LOG)

14. DEFENSIVE MITIGATIONS

Priority 1: CRITICAL

Priority 2: HIGH

15. DETECTION & INCIDENT RESPONSE

Step Phase Technique Description
1 Initial Access Compromised workstation/profile Attacker gains interactive access.
2 Collection COLLECT-EMAIL-002 – Outlook Mailbox Export Local PST/OST export.
3 Exfiltration Data staging and transfer PST/OST moved to external destination.

17. REAL-WORLD EXAMPLES

Example 1: Energy Sector Intrusions (Local Email Collection)

Example 2: Insider Exfiltration via PST Export