Microsoft Sentinel - Cyber Range Project
August 03, 2025 · 1490 words · 7 min read
Management suspects that some employees may be using TOR browsers to bypass network security controls because recent network logs show unusual encrypted traffic patterns and connections to known TOR entry nodes. Additionally, there have been anonymous reports of employees discussing ways to access restricted sites during work hours. The goal is to detect any TOR usage and analyze related security incidents to mitigate potential risks. If any use of TOR is found, notify management.
DeviceFileEvents for any tor(.exe) or firefox(.exe) file events.DeviceProcessEvents for any signs of installation or usage.DeviceNetworkEvents for any signs of outgoing connections over known TOR ports.DeviceFileEvents TableSearched the DeviceFileEvents table for ANY file that had the string “tor” in it and discovered that the user “chungleboi” downloaded a Tor installer, did something that resulted in many Tor-related files being copied to the desktop, and created a file called tor-shopping-list.txt on the desktop. These events began at: 2025-08-03T14:32:07.4336421Z
Query used to locate events:
DeviceFileEvents
| where DeviceName contains "ortiz"
| where FileName contains "tor"
| order by Timestamp desc
| where InitiatingProcessAccountName == "chungleboi"
| where Timestamp >= datetime(2025-08-03T14:32:07.4336421Z)
| project Timestamp, DeviceName, ActionType, FileName, FolderPath, SHA256, Account = InitiatingProcessAccountName, InitiatingProcessId

DeviceProcessEvents TableSearched the DeviceProcessEvents table for any ProcessCommandLine that contained the string tor-browser-windows-x86_64-portable-14.5.5.exe. Based on the logs returned, on August 3rd, 2025, at 9:34:34 AM, a user named “chungleboi” on a computer called “ortiz-mde-test” ran the Tor browser installer from their Downloads folder. The installer was executed with a “/S” flag, which means it ran silently in the background without showing the usual installation prompts or windows to the user.
Query used to locate event:
DeviceProcessEvents
| where DeviceName contains "ortiz"
| where ProcessCommandLine contains "tor-browser-windows-x86_64-portable-14.5.5.exe"
| project Timestamp, AccountName, DeviceName, ActionType, FolderPath, SHA256, ProcessCommandLine

DeviceProcessEvents Table for TOR Browser ExecutionSearched the DeviceProcessEvents table for any indication that user “chungleboi” actually opened the Tor browser. There was evidence that they did open it at 2025-08-03T14:39:23.1647585Z. There were several other instances of firefox.exe (Tor) as well as tor.exe spawned afterwards.
Query used to locate events:
DeviceProcessEvents
| where DeviceName contains "ortiz"
| where FileName has_any ("tor.exe", "firefox.exe", "tor-browser.exe")
| project Timestamp, AccountName, DeviceName, ActionType, FolderPath, SHA256, ProcessCommandLine
| order by Timestamp desc

DeviceNetworkEvents Table for TOR Network ConnectionsSearched the DeviceNetworkEvents table for any indication that the Tor browser was used to establish a connection using any of the known Tor ports. At 2025-08-03T14:39:58.5567161Z, an employee on the “ortiz-mde-test” device successfully established a connection to the remote IP 185.220.101.198 via port 443. The connection was initiated by the process tor.exe, located in the folder c:\users\chungleboi\desktop\tor browser\browser\torbrowser\tor\tor.exe. There were a few more connections made over other ports.
Query used to locate events:
DeviceNetworkEvents
| where DeviceName == "ortiz-mde-test"
| where InitiatingProcessFileName in ("tor.exe", "firefox.exe")
| where RemotePort in ("9001", "9030", "9040", "9050", "9051", "9151", "80", "443")
| project Timestamp, DeviceName, ActionType, RemoteIP, RemotePort, RemoteUrl, InitiatingProcessAccountName, InitiatingProcessFileName, InitiatingProcessId, InitiatingProcessParentId, InitiatingProcessFolderPath
| order by Timestamp desc
| where Timestamp >= datetime(2025-08-03T14:39:25.0575445Z)

9:32:07 AM - Initial Tor Browser installer file appears
9:34:34 AM - Tor installer executed with silent flag
9:34:54 AM - Tor application files created on desktop
tor.exe (main Tor executable)9:35:04 AM - Desktop shortcut created
9:39:23 AM - Tor browser launched
9:39:26 AM - Browser profile initialization
9:39:27-33 AM - Multiple Firefox content processes spawned
9:39:31 AM - Tor daemon process started
9:39:33 AM - First internal connection established
9:39:40 AM - First external Tor connections established
9:39:44-45 AM - Additional Tor relay connections
9:39:59 AM - 9:47:54 AM - Continued browser activity
9:45:45 AM - Form history database created
9:51:07 AM - Suspicious file created
9:51:45 AM - Shopping list file modified
9:54:03 AM - Web applications storage created
12:41:51 PM - Second Tor session initiated
12:41:57 PM - Tor daemon restarted
12:42:43 PM - New Tor connections established
2:21:45-46 PM - Final network activity
The evidence indicates intentional installation and sustained use of the Tor browser for accessing onion services, combined with the creation of a suspicious “shopping list” file that may indicate illicit marketplace activity. The user demonstrated security awareness by using silent installation, suggesting potential malicious intent rather than legitimate privacy usage.
"tor-shopping-list.txt" fileTOR usage was confirmed on endpoint ortiz-mde-test by the user chungleboi. The device was isolated, and the user’s direct manager was notified.