Tega Ewubare

Threat Event (Unauthorized TOR Usage)

Unauthorized TOR Browser Installation and Use

Steps the "Bad Actor" took Create Logs and IoCs:

  1. Download the TOR browser installer: https://www.torproject.org/download/

  2. Install it silently: tor-browser-windows-x86_64-portable-14.0.1.exe /S

  3. Opens the TOR browser from the folder on the desktop

  4. Connect to TOR and browse a few sites. For example:

    • WARNING: The links to onion sites change a lot and these have changed. However if you connect to Tor and browse around normal sites a bit, the necessary logs should still be created:
    • Current Dread Forum: dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion
    • Dark Markets Forum: dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/DarkNetMarkets
    • Current Elysium Market: elysiumutkwscnmdohj23gkcyp3ebrf4iio3sngc5tvcgyfp4nqqmwad.top/login
  5. Create a folder on your desktop called tor-shopping-list.txt and put a few fake (illicit) items in there

  6. Delete the file.


Tables Used to Detect IoCs:

Parameter Description
Name DeviceFileEvents
Info https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceinfo-table
Purpose Used for detecting TOR download and installation, as well as the shopping list creation and deletion.
Parameter Description
Name DeviceProcessEvents
Info https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceinfo-table
Purpose Used to detect the silent installation of TOR as well as the TOR browser and service launching.
Parameter Description
Name DeviceNetworkEvents
Info https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-devicenetworkevents-table
Purpose Used to detect TOR network activity, specifically tor.exe and firefox.exe making connections over ports to be used by TOR (9001, 9030, 9040, 9050, 9051, 9150).

// Installer name == tor-browser-windows-x86_64-portable-(version).exe
// Detect the installer being downloaded
DeviceFileEvents
| where FileName startswith "tor"

// TOR Browser being silently installed
// Take note of two spaces before the /S (I don't know why)
DeviceProcessEvents
| where ProcessCommandLine contains "tor-browser-windows-x86_64-portable-14.0.1.exe  /S"
| project Timestamp, DeviceName, ActionType, FileName, ProcessCommandLine

// TOR Browser or service was successfully installed and is present on the disk
DeviceFileEvents
| where FileName has_any ("tor.exe", "firefox.exe")
| project  Timestamp, DeviceName, RequestAccountName, ActionType, InitiatingProcessCommandLine

// TOR Browser or service was launched
DeviceProcessEvents
| where ProcessCommandLine has_any("tor.exe","firefox.exe")
| project  Timestamp, DeviceName, AccountName, ActionType, ProcessCommandLine

// TOR Browser or service is being used and is actively creating network connections
DeviceNetworkEvents
| where InitiatingProcessFileName in~ ("tor.exe", "firefox.exe")
| where RemotePort in (9001, 9030, 9040, 9050, 9051, 9150)
| project Timestamp, DeviceName, InitiatingProcessAccountName, InitiatingProcessFileName, RemoteIP, RemotePort, RemoteUrl
| order by Timestamp desc

// User shopping list was created and, changed, or deleted
DeviceFileEvents
| where FileName contains "shopping-list.txt"