-
Notifications
You must be signed in to change notification settings - Fork 445
Add Windows TOR Client Execution Detected #3881
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This detection is used to detects the execution of TOR browser and it's components on windows systems. If you need any further information, please reach out to me via Slack. Slack ID - Vignesh Subramanian
1. Focused on detecting tor.exe and added the process_path field to detect TOR execution within Brave Browser. Brave Browser includes a built-in TOR client that is not explicitly named tor.exe during process creation; instead, it appears as tor-0.4.8.19-win32-brave-0. To capture this, I added the Brave Browser path to the detection logic to identify the presence of TOR within Brave. I also introduced wildcards in the path to support any version TOR binaries used by Brave, ensuring that different version numbers are correctly matched. 2. Avoided using escape characters to improve readability. 3. The provided ID has been added. 4. The process field has been added as a threat object. 5. Additional tokens have been included in the risk-based alerting message to make it clearer and more meaningful. 6. The word “detection” has been removed from the title, which is now: "Windows TOR Client Execution" 7. Added the correct attack dataset link from (https://github.com/splunk/attack_data/blob/master/datasets/attack_techniques/T1090.003/windows_tor_client_execution/windows-sysmon.log)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @nasbench,
I have done the changes which you mentioned in the above. Please do review and let me know for any further changes.
-
Focused on detecting
tor.exebased on our interest and removed wildcard*tor*. -
Added the
process_pathfield to detect TOR execution within Brave Browser because it includes a built-in TOR client that is not explicitly namedtor.exeduring process creation; instead, it appears astor-0.4.8.19-win32-brave-0. To capture this, I added the Brave Browser path to the detection logic to identify the presence of TOR within Brave.

-
I also added wildcards in the path to support any versions of TOR binaries used by Brave, ensuring that different version numbers are correctly matched.

-
Avoided using escape characters to improve readability.
-
The provided ID has been incorporated.
-
The process file has been added as a threat object.
-
Additional tokens have been included in the risk-based alerting message to make it clearer and more meaningful.
-
The word detection has been removed from the title, which is now:
Windows TOR Client Execution -
Added the correct attack dataset link from (https://github.com/splunk/attack_data/blob/master/datasets/attack_techniques/T1090.003/windows_tor_client_execution/windows-sysmon.log)
Updated the detection configuration for Windows TOR Client Execution, including changes to the description, how to implement, known false positives, and drilldown searches.
| Processes.process_path = "*\\BraveSoftware\\Brave-Browser*" | ||
| Processes.process_path = "*\\tor-*" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just FYI in order to avoid using wildcard inside of strings (which is not a recommended things to do). I split the string like this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I understood and thank you for doing the changes.
|
neat! these changes look great! thanks Nas and @vignesh-user for the contribution! App inspect expected to fail on PRs from forks |
|
Thank you very much @nasbench for your inputs and changes and @patel-bhavin for merging my PR! |
Details
This PR adds a new detection that identifies TOR Browser and related TOR component execution on Windows endpoints using process creation telemetry.
The analytic monitors process name and parent process name to detect TOR execution originating from common parent processes such as browsers and command-line utilities. This behavior may indicate attempts to anonymize activity, evade monitoring, or bypass security controls.
Screenshots of the detection logic and test results are included for validation. Also, before merging this request please merge the attack dataset PR (splunk/attack_data#1123)
If you need any further information, please reach out to me via Slack.
Slack ID: Vignesh Subramanian
Checklist
<platform>_<mitre att&ck technique>_<short description>nomenclature