← Back to SOC feed Coverage →

Teams Malware ZAP

kql MEDIUM Azure-Sentinel
T1566
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use Teams to exfiltrate data or deploy malware by leveraging ZAPed messages to bypass traditional detection mechanisms. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential lateral movement or data exfiltration attempts hidden within legitimate messaging traffic.

KQL Query

//Zero-hour auto purge (ZAP) took action on Teams messages containing Malware after delivery.
MessagePostDeliveryEvents
| where ActionType == 'Malware ZAP' 

Analytic Rule Definition

id: dc961519-a3d3-4b95-8459-982858f0cca6
name: Teams Malware ZAP
description: |
  This query helps hunt for Teams messages with Malware threats that have been ZAPed.
description-detailed: |
  This query helps hunt for Teams messages with Malware threats that have been ZAPed, using Microsoft Defender for Office 365 and Advance hunting in Microsoft Defender XDR
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - MessagePostDeliveryEvents
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  //Zero-hour auto purge (ZAP) took action on Teams messages containing Malware after delivery.
  MessagePostDeliveryEvents
  | where ActionType == 'Malware ZAP' 
version: 1.0.0

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/Teams Malware ZAP .yaml