Falcon X is CrowdStrike’s automated threat intelligence platform that enables security teams to analyze, investigate, and respond to threats faster. It integrates malware sandboxing, threat intelligence reports, and IOC enrichment into the Falcon Console, helping organizations proactively defend against emerging threats.
This guide explains how to use Falcon X to analyze threats and gather intelligence on malicious activity.
Step 1: Log Into the Falcon Console
- - Open a browser and go to: [https://falcon.crowdstrike.com](https://falcon.crowdstrike.com/) or [https://falcon.us-2.crowdstrike.com/](https://falcon.us-2.crowdstrike.com/) (Varies by tenant).
- Sign in using your **admin credentials**.
- In the **left-hand menu**, navigate to **Falcon X**.
Step 2: Submit a File for Malware Analysis
- - Go to **Threat Intelligence** > **Falcon X Sandbox**.
- Click **Submit New File**.
- Upload a file for analysis (e.g., suspicious executable, document, or script).
- Choose the **analysis mode**:
-
Standard – Runs a quick automated check.
-
Extended – Provides in-depth sandboxing results.
-
Click Submit and wait for the sandbox results.
Step 3: Review Falcon X Sandbox Analysis
- - Once the analysis is complete, open the **Falcon X Report**.
- Review:
-
File behavior (e.g., process execution, network activity).
-
MITRE ATT&CK Tactics & Techniques used by the malware.
-
Command and Control (C2) communication indicators.
-
Associated IOCs (file hashes, domains, IP addresses).
-
If the file is malicious, move to contain the threat.
Step 4: Investigate Threat Intelligence Reports
- - Navigate to **Falcon X > Intelligence Reports**.
- Search for known **threat actors, malware families, or tactics**.
- Use the intelligence to:
- Understand attacker motives and techniques.
- Identify if the attack is part of a larger campaign.
- Proactively block related threats using CrowdStrike’s IOCs.
Step 5: Export IOCs and Automate Response
- - Navigate to **Threat Intelligence > IOCs**.
- Export malicious indicators and apply them to:
-
Firewall rules (block known bad IPs).
-
Endpoint security policies (prevent execution of similar files).
-
SIEM integration (correlate threats across logs).
-
Configure automated playbooks in Falcon X to streamline future responses.