Dan Chui
Happy Bytes
cybersecurity

Threat Hunting Case Study: Investigating Tor Browser Activity

Threat Hunting Case Study: Investigating Tor Browser Activity
4 min read
#cybersecurity

šŸ” Threat Hunting Case Study: Investigating Tor Browser Activity

In this case study, I walk through an end-to-end threat hunting investigation involving Tor Browser activity identified on an endpoint.

This project was conducted as part of my Cyber Range training, focusing on SIEM-based investigation, incident response, and risk assessment.


🧠 Why This Matters

Tor is not inherently malicious - but in enterprise environments, it introduces risks:

  • ā— anonymized communications
  • ā— potential data exfiltration
  • ā— bypass of monitoring controls

This makes it a strong candidate for proactive threat hunting.


šŸ”Ž Detection: Where It Started

The investigation began with a threat hunting query in Microsoft Defender for Endpoint.

Image

Initial query results highlighting suspicious process and network activity.

At this stage, the goal was to identify any indicators of non-standard or risky behavior.


šŸ› ļø Investigation Approach

I followed a structured workflow:

1ļøāƒ£ Identify suspicious indicators
2ļøāƒ£ Analyze file activity
3ļøāƒ£ Review process execution
4ļøāƒ£ Investigate network connections
5ļøāƒ£ Reconstruct timeline
6ļøāƒ£ Assess risk and recommend actions


šŸ“ File & Process Activity

The investigation confirmed the presence and execution of Tor-related binaries.

Image

Execution of tor.exe, confirming active use of anonymization software.

This step is critical because it moves from potential indicator → confirmed execution.


🌐 Network Activity

The most important signal came from outbound connections.

Image

Outbound traffic over port 9001, consistent with Tor relay communication.

This confirms:

šŸ‘‰ The system was actively communicating with the Tor network.


šŸ•’ Timeline Reconstruction

To better understand the sequence, I reconstructed the activity timeline.

StageEvent
T0Tor downloaded
T1Installation completed
T2tor.exe executed
T3Tor network connection established
Time (UTC)Event
00:18:19Tor installer downloaded
00:21:44Tor installer executed
00:22:04–00:22:12Tor files extracted to Desktop
00:22:22Tor Browser launched
00:22:34Connection established to Tor relay
00:22:37–00:27:54Continued Tor browsing activity
00:35:58tor-shopping-list.txt created

āš ļø Risk Assessment

While no direct malicious payload was identified, the following risks were present:

  • šŸ” Potential data exfiltration via anonymized channels
  • 🚫 Violation of acceptable use policies
  • šŸ‘ļø Reduced visibility for security monitoring

šŸ‘‰ Overall Risk Rating: Medium


Immediate

  • Isolate affected host
  • Remove Tor software
  • Review user activity

Long-Term

  • Implement application whitelisting
  • Block Tor traffic at network level
  • Strengthen endpoint monitoring

🧠 Key Takeaways

šŸ’” Threat hunting helps uncover risks that alerts may miss
šŸ’” SIEM visibility is critical for correlating activity
šŸ’” Clear documentation is essential for incident response


šŸ“„ Download the Executive Summary Report

šŸ‘‰ Tor Incident Case Report (PDF)

šŸ”— Full report and supporting files available on GitHub


šŸš€ Final Thoughts

This project reflects how security investigations extend beyond detection - they require analysis, context, and risk-based decision-making.

As I continue developing my cybersecurity skills, I aim to bridge:

šŸ‘‰ security operations + risk governance


āš ļø Disclaimer: This project is a simulated threat hunting exercise created for educational and portfolio purposes. The environment, devices, and user accounts referenced are part of a controlled lab environment and do not represent real-world systems or individuals.


Thanks for reading! šŸ™

If you're interested in security governance, GRC frameworks, or enterprise risk programs - feel free to connect with me on LinkedIn.

Feel free to reach out with questions or thoughts.