Dan Chui
Happy Bytes
cybersecurity

Threat Hunting with Microsoft Defender: Investigating Tor Browser Activity

Threat Hunting with Microsoft Defender: Investigating Tor Browser Activity
6 min read
#cybersecurity

๐Ÿ”Ž Threat Hunting with Microsoft Defender: Investigating Tor Browser Activity

Threat hunting is one of the most valuable skills for a security analyst. Rather than waiting for alerts, analysts proactively search for suspicious activity hidden in telemetry data.

In this project, I conducted a threat hunt using Microsoft Defender XDR Advanced Hunting to investigate suspicious activity related to the Tor Browser on an endpoint.

The investigation confirmed that Tor was downloaded, installed, and used on the system, with network connections established to Tor relay infrastructure.

Let's walk through the investigation process step-by-step.


๐ŸŽฏ Investigation Overview

FieldValue
Investigation TypeThreat Hunt
PlatformMicrosoft Defender XDR
Endpointvm-hunt-tyo
Userdan
Detection MethodKQL Log Analysis

Investigation Objective

Identify whether the Tor Browser was installed or used on the endpoint and determine:

  • When Tor was downloaded
  • Whether it was executed
  • If network connections to Tor infrastructure occurred
  • What user artifacts were created during activity

๐Ÿง  Why Tor Activity Matters

Tor itself is not malicious, but it is often associated with:

๐Ÿ” Anonymous browsing
๐Ÿ•ธ Dark web marketplace access
๐Ÿ“ค Data exfiltration
๐Ÿšซ Corporate security policy violations

For security teams, Tor usage can be a high-risk signal depending on the environment.


๐Ÿ” Threat Hunting Methodology

The investigation relied on Microsoft Defender Advanced Hunting and several telemetry tables:

Log SourcePurpose
DeviceFileEventsDetect Tor downloads and file creation
DeviceProcessEventsDetect installer execution
DeviceNetworkEventsIdentify Tor network connections

The hunting workflow followed this sequence:

1๏ธโƒฃ Identify Tor-related file downloads
2๏ธโƒฃ Confirm installer execution
3๏ธโƒฃ Detect Tor process creation
4๏ธโƒฃ Identify network connections to Tor infrastructure
5๏ธโƒฃ Investigate user artifacts created during activity


โฑ Timeline of Events

The investigation revealed the following timeline:

Time (UTC)Event
00:18:19Tor installer downloaded
00:21:44Tor installer executed
00:22:04โ€“00:22:12Tor files extracted to Desktop
00:22:22Tor Browser launched
00:22:34Connection established to Tor relay
00:22:37โ€“00:27:54Continued Tor browsing activity
00:35:58tor-shopping-list.txt created

This sequence shows a complete activity chain from download to network communication.


๐Ÿ“ฅ Step 1: Identifying Tor Downloads

The first step was to search for any file containing the string "tor".

DeviceFileEvents
| where DeviceName == "vm-hunt-tyo"
| where InitiatingProcessAccountName == "dan"
| where FileName startswith "tor"
| order by Timestamp desc

This query identified the download of: tor-browser-windows-x86_64-portable-15.0.7.exe

This installer was downloaded to the Downloads directory, marking the start of Tor activity.

Image

โš™๏ธ Step 2: Detecting Installer Execution

Next, I searched process execution logs to determine whether the installer was run.

DeviceProcessEvents
| where DeviceName == "vm-hunt-tyo"
| where ProcessCommandLine contains "tor-browser"

The logs confirmed that the installer was executed and triggered a silent installation.

Image

๐Ÿš€ Step 3: Detecting Tor Process Activity

To confirm that Tor was actually launched, I searched for the following processes:

tor.exe | firefox.exe (Tor Browser)

DeviceProcessEvents
| where FileName has_any ("tor.exe","firefox.exe")

The logs confirmed both processes were executed shortly after installation.

Image

๐ŸŒ Step 4: Detecting Tor Network Connections

One of the strongest indicators of Tor activity is network communication with Tor relay nodes.

Tor commonly uses ports such as:

9001 | 9030 | 9050 | 9051 | 9150

The following query identified Tor network activity:

DeviceNetworkEvents
| where DeviceName == "vm-hunt-tyo"
| where InitiatingProcessFileName in ("tor.exe","firefox.exe")
| where RemotePort in ("9001","9030","9040","9050","9051","9150","80","443")

The endpoint established a connection to:

IP Address: 15.204.223.128 | Port: 9001 | Process: tor.exe

This confirms the system successfully connected to a Tor relay node.

Image

๐Ÿ“„ Step 5: Identifying User Artifacts

Later in the timeline, the following file was created on the Desktop: tor-shopping-list.txt

Image

While the file contents were not analyzed in this investigation, its name suggests it may have been created during Tor browsing activity.


๐Ÿšจ Indicators of Compromise (IOCs)

TypeIndicator
Filetor-browser-windows-x86_64-portable-15.0.7.exe
Filetor-shopping-list.txt
Processtor.exe
Processfirefox.exe
IP Address15.204.223.128
Port9001

๐Ÿงฌ MITRE ATT&CK Mapping

The activity observed aligns with several MITRE ATT&CK techniques:

TechniqueID
User ExecutionT1204
Ingress Tool TransferT1105
Application Layer ProtocolT1071
Encrypted ChannelT1573

These techniques describe the download, execution, and encrypted communication behaviors observed during the investigation.


๐Ÿ›ก Security Assessment

This investigation confirmed:

  • Tor Browser was downloaded
  • Tor Browser was executed
  • Tor processes ran on the endpoint
  • The system connected to the Tor network

Although Tor is not inherently malicious, its presence in enterprise environments can indicate:

  • Anonymous activity
  • Attempts to bypass monitoring
  • Possible policy violations

Organizations often monitor or restrict Tor usage as part of their security controls.


Endpoint Monitoring

Detect execution of: tor.exe

Application Control

Restrict installation of anonymizing tools such as:

  • Tor Browser
  • Proxy tunneling tools
  • Network Controls

Consider blocking outbound connections to common Tor ports: 9001 | 9030 | 9050 | 9051 | 9150


๐Ÿงพ Conclusion

This threat hunting investigation confirmed that the Tor Browser was downloaded, installed, and used on the endpoint, vm-hunt-tyo.

The browser successfully connected to Tor relay infrastructure, enabling anonymous communication through the Tor network.

While no additional malicious payloads were identified during this investigation, the presence of anonymizing tools may represent a security policy violation and potential risk within enterprise environments.


๐Ÿ“ฅ Download the Executive Summary Report

๐Ÿ‘‰ Tor Threat Hunting Summary Report (PDF)

๐Ÿ”— Full report and supporting files available on GitHub


โš ๏ธ Disclaimer: This project is a simulated threat hunting exercise created for educational and portfolio purposes. The environment, devices, and user accounts referenced are part of a controlled lab environment and do not represent real-world systems or individuals.


Thanks for reading! ๐Ÿ™

If you're interested in security governance, GRC frameworks, or enterprise risk programs - feel free to connect with me on LinkedIn.

Feel free to reach out with questions or thoughts.