www.crowdstrike.com Open in urlscan Pro
2606:4700::6810:b576  Public Scan

URL: https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/
Submission: On July 22 via api from TR — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

___

Skip to main contentEnable accessibility for low visionOpen the accessibility
menu










x
 * Remediation and Guidance Hub: Falcon Content Update for Windows Hosts

Read now

 * 
 * 
 * 
 * 
 * 
 * 

BLOG
 * Featured
   * Remediation and Guidance Hub: Falcon Content Update for Windows Hosts
     Jul 19, 2024
   * Technical Details: Falcon Content Update for Windows Hosts
     Jul 20, 2024
   * To Our Customers and Partners
     Jul 19, 2024
   * Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target
     CrowdStrike Customers
     Jul 19, 2024
 * Recent
   * Likely eCrime Actor Uses Filenames Capitalizing on July 19, 2024, Falcon
     Sensor Content Issues in Operation Targeting LATAM-Based CrowdStrike
     Customers
     Jul 20, 2024
   * Technical Details: Falcon Content Update for Windows Hosts
     Jul 20, 2024
   * Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target
     CrowdStrike Customers
     Jul 19, 2024
   * To Our Customers and Partners
     Jul 19, 2024
 * Videos
   * Video Highlights the 4 Key Steps to Successful Incident Response
     Dec 02, 2019
   * Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less
     [VIDEO]
     Feb 21, 2019
   * Analyzing Targeted Intrusions Through the ATT&CK Framework Lens [VIDEO]
     Jan 23, 2019
   * Qatar’s Commercial Bank Chooses CrowdStrike Falcon®: A Partnership Based on
     Trust [VIDEO]
     Aug 20, 2018
 * Categories
   * Cloud and Application Security
     Cloud and Application Security
     
     Essential Considerations When Choosing a DSPM Solution
     07/10/2024
     
     Proactively Secure Serverless Functions Across AWS, Google Cloud and Azure
     with Falcon Cloud Security
     07/08/2024
     
     Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless
     Application Security
     06/26/2024
     
     3 Crucial Capabilities for Effective Cloud Detection and Response
     06/24/2024
   * Counter Adversary Operations
     Counter Adversary Operations
     
     Likely eCrime Actor Uses Filenames Capitalizing on July 19, 2024, Falcon
     Sensor Content Issues in Operation Targeting LATAM-Based CrowdStrike
     Customers
     07/20/2024
     
     Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target
     CrowdStrike Customers
     07/19/2024
     
     CrowdStrike’s One-Click Hunting Simplifies Threat Hunting for Security
     Teams
     07/01/2024
     
     Secure Your Staff: How to Protect High-Profile Employees’ Sensitive Data on
     the Web
     04/18/2024
   * Endpoint Security & XDR
     Endpoint Security & XDR
     
     CrowdStrike Named a Customers’ Choice in 2024 Gartner® Voice of the
     Customer for Endpoint Protection Platform Report
     07/11/2024
     
     3 Ways Small Businesses Can Make Big Strides in Cybersecurity
     06/14/2024
     
     CrowdStrike Falcon for Mobile Unlocks New Mobile Security Options for SMBs
     06/13/2024
     
     Retailer Compares Microsoft with CrowdStrike for Security. The Verdict?
     “It’s Not Even Close”
     06/05/2024
   * Engineering & Tech
     Engineering & Tech
     
     EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware
     Analysis
     06/06/2024
     
     CrowdStrike Falcon Next-Gen SIEM Unveils Advanced Detection of Ransomware
     Targeting VMware ESXi Environments
     04/15/2024
     
     CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at
     Telecommunications Customer
     09/27/2023
     
     The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part
     2
     09/01/2023
   * Executive Viewpoint
     Executive Viewpoint
     
     Technical Details: Falcon Content Update for Windows Hosts
     07/20/2024
     
     To Our Customers and Partners
     07/19/2024
     
     Remediation and Guidance Hub: Falcon Content Update for Windows Hosts
     07/19/2024
     
     CrowdStrike Unifies Threat Data and AI for Next-Gen Managed Detection and
     Response
     07/15/2024
   * Exposure Management
     Exposure Management
     
     July 2024 Patch Tuesday: Two Zero-Days and Five Critical Vulnerabilities
     Amid 142 CVEs
     07/10/2024
     
     Seeing the Unseen: Preventing Breaches by Spotting Malicious Browser
     Extensions
     06/27/2024
     
     June 2024 Patch Tuesday: 51 Vulnerabilities Addressed Including One
     Critical and One Zero-Day
     06/11/2024
     
     Active Exploitation Observed for Linux Kernel Privilege Escalation
     Vulnerability (CVE-2024-1086)
     06/06/2024
   * From The Front Lines
     From The Front Lines
     
     CrowdStrike Named a Leader with “Bold Vision” in 2024 Forrester Wave for
     Cybersecurity Incident Response Services
     06/10/2024
     
     How to Defend Employees and Data as Social Engineering Evolves
     03/22/2024
     
     The Anatomy of an ALPHA SPIDER Ransomware Attack
     02/29/2024
     
     CrowdStrike Services Offers Incident Response Executive Preparation
     Checklist
     10/23/2023
   * Identity Protection
     Identity Protection
     
     CrowdStrike Brings Industry-Leading ITDR to All Major Cloud-Based Identity
     Providers
     05/28/2024
     
     CrowdStrike Named Overall Leader in Industry’s First ITDR Comparative
     Report
     04/30/2024
     
     CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the
     Cloud
     04/10/2024
     
     Falcon Fund in Focus: Aembit Strengthens Security for Workload-to-Workload
     Access
     01/30/2024
   * Next-Gen SIEM & Log Management
     Next-Gen SIEM & Log Management
     
     CrowdStrike Simplifies Ingestion of High-Value Data into the Falcon
     Platform
     07/08/2024
     
     Stop Phishing Attacks with Next-Gen SIEM and SOAR
     06/24/2024
     
     Unlock Advanced Security Automation for Next-Gen SIEM
     06/20/2024
     
     Meeting the Need for Speed in the SOC
     06/17/2024
   * Public Sector
     Public Sector
     
     Achieving Ecosystem-level Cybersecurity: A U.S. Policy Perspective
     06/11/2024
     
     CrowdStrike Launches SEC Readiness Services to Prepare Boardrooms for New
     Regulations
     03/14/2024
     
     Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike
     03/04/2024
     
     After Years of Success, State of Wyoming Looks to Expand CrowdStrike
     Protections Statewide
     02/28/2024
 * Start Free Trial
   * Cloud and Application Security
     Cloud and Application Security
     
     Essential Considerations When Choosing a DSPM Solution
     07/10/2024
     
     Proactively Secure Serverless Functions Across AWS, Google Cloud and Azure
     with Falcon Cloud Security
     07/08/2024
     
     Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless
     Application Security
     06/26/2024
     
     3 Crucial Capabilities for Effective Cloud Detection and Response
     06/24/2024
   * Counter Adversary Operations
     Counter Adversary Operations
     
     Likely eCrime Actor Uses Filenames Capitalizing on July 19, 2024, Falcon
     Sensor Content Issues in Operation Targeting LATAM-Based CrowdStrike
     Customers
     07/20/2024
     
     Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target
     CrowdStrike Customers
     07/19/2024
     
     CrowdStrike’s One-Click Hunting Simplifies Threat Hunting for Security
     Teams
     07/01/2024
     
     Secure Your Staff: How to Protect High-Profile Employees’ Sensitive Data on
     the Web
     04/18/2024
   * Endpoint Security & XDR
     Endpoint Security & XDR
     
     CrowdStrike Named a Customers’ Choice in 2024 Gartner® Voice of the
     Customer for Endpoint Protection Platform Report
     07/11/2024
     
     3 Ways Small Businesses Can Make Big Strides in Cybersecurity
     06/14/2024
     
     CrowdStrike Falcon for Mobile Unlocks New Mobile Security Options for SMBs
     06/13/2024
     
     Retailer Compares Microsoft with CrowdStrike for Security. The Verdict?
     “It’s Not Even Close”
     06/05/2024
   * Engineering & Tech
     Engineering & Tech
     
     EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware
     Analysis
     06/06/2024
     
     CrowdStrike Falcon Next-Gen SIEM Unveils Advanced Detection of Ransomware
     Targeting VMware ESXi Environments
     04/15/2024
     
     CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at
     Telecommunications Customer
     09/27/2023
     
     The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part
     2
     09/01/2023
   * Executive Viewpoint
     Executive Viewpoint
     
     Technical Details: Falcon Content Update for Windows Hosts
     07/20/2024
     
     To Our Customers and Partners
     07/19/2024
     
     Remediation and Guidance Hub: Falcon Content Update for Windows Hosts
     07/19/2024
     
     CrowdStrike Unifies Threat Data and AI for Next-Gen Managed Detection and
     Response
     07/15/2024
   * Exposure Management
     Exposure Management
     
     July 2024 Patch Tuesday: Two Zero-Days and Five Critical Vulnerabilities
     Amid 142 CVEs
     07/10/2024
     
     Seeing the Unseen: Preventing Breaches by Spotting Malicious Browser
     Extensions
     06/27/2024
     
     June 2024 Patch Tuesday: 51 Vulnerabilities Addressed Including One
     Critical and One Zero-Day
     06/11/2024
     
     Active Exploitation Observed for Linux Kernel Privilege Escalation
     Vulnerability (CVE-2024-1086)
     06/06/2024
   * From The Front Lines
     From The Front Lines
     
     CrowdStrike Named a Leader with “Bold Vision” in 2024 Forrester Wave for
     Cybersecurity Incident Response Services
     06/10/2024
     
     How to Defend Employees and Data as Social Engineering Evolves
     03/22/2024
     
     The Anatomy of an ALPHA SPIDER Ransomware Attack
     02/29/2024
     
     CrowdStrike Services Offers Incident Response Executive Preparation
     Checklist
     10/23/2023
   * Identity Protection
     Identity Protection
     
     CrowdStrike Brings Industry-Leading ITDR to All Major Cloud-Based Identity
     Providers
     05/28/2024
     
     CrowdStrike Named Overall Leader in Industry’s First ITDR Comparative
     Report
     04/30/2024
     
     CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the
     Cloud
     04/10/2024
     
     Falcon Fund in Focus: Aembit Strengthens Security for Workload-to-Workload
     Access
     01/30/2024
   * Next-Gen SIEM & Log Management
     Next-Gen SIEM & Log Management
     
     CrowdStrike Simplifies Ingestion of High-Value Data into the Falcon
     Platform
     07/08/2024
     
     Stop Phishing Attacks with Next-Gen SIEM and SOAR
     06/24/2024
     
     Unlock Advanced Security Automation for Next-Gen SIEM
     06/20/2024
     
     Meeting the Need for Speed in the SOC
     06/17/2024
   * Public Sector
     Public Sector
     
     Achieving Ecosystem-level Cybersecurity: A U.S. Policy Perspective
     06/11/2024
     
     CrowdStrike Launches SEC Readiness Services to Prepare Boardrooms for New
     Regulations
     03/14/2024
     
     Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike
     03/04/2024
     
     After Years of Success, State of Wyoming Looks to Expand CrowdStrike
     Protections Statewide
     02/28/2024


 * Featured
 * Recent
 * Videos
 * Categories
 * Start Free Trial


TECHNICAL DETAILS: FALCON CONTENT UPDATE FOR WINDOWS HOSTS

July 20, 2024

|CrowdStrike |Executive Viewpoint



WHAT HAPPENED?

On July 19, 2024 at 04:09 UTC, as part of ongoing operations, CrowdStrike
released a sensor configuration update to Windows systems. Sensor configuration
updates are an ongoing part of the protection mechanisms of the Falcon platform.
This configuration update triggered a logic error resulting in a system crash
and blue screen (BSOD) on impacted systems.

The sensor configuration update that caused the system crash was remediated on
Friday, July 19, 2024 05:27 UTC.

This issue is not the result of or related to a cyberattack.


IMPACT

Customers running Falcon sensor for Windows version 7.11 and above, that were
online between Friday, July 19, 2024 04:09 UTC and Friday, July 19, 2024 05:27
UTC, may be impacted. 

Systems running Falcon sensor for Windows 7.11 and above that downloaded the
updated configuration from 04:09 UTC to 05:27 UTC – were susceptible to a system
crash.


CONFIGURATION FILE PRIMER

The configuration files mentioned above are referred to as “Channel Files” and
are part of the behavioral protection mechanisms used by the Falcon sensor.
Updates to Channel Files are a normal part of the sensor’s operation and occur
several times a day in response to novel tactics, techniques, and procedures
discovered by CrowdStrike. This is not a new process; the architecture has been
in place since Falcon’s inception.


TECHNICAL DETAILS

On Windows systems, Channel Files reside in the following directory:

C:\Windows\System32\drivers\CrowdStrike\

and have a file name that starts with “C-”. Each channel file is assigned a
number as a unique identifier. The impacted Channel File in this event is 291
and will have a filename that starts with “C-00000291-” and ends with a .sys
extension. Although Channel Files end with the SYS extension, they are not
kernel drivers.

Channel File 291 controls how Falcon evaluates named pipe1 execution on Windows
systems. Named pipes are used for normal, interprocess or intersystem
communication in Windows.

The update that occurred at 04:09 UTC was designed to target newly observed,
malicious named pipes being used by common C2 frameworks in cyberattacks. The
configuration update triggered a logic error that resulted in an operating
system crash. 


CHANNEL FILE 291

CrowdStrike has corrected the logic error by updating the content in Channel
File 291. No additional changes to Channel File 291 beyond the updated logic
will be deployed. Falcon is still evaluating and protecting against the abuse of
named pipes. 

This is not related to null bytes contained within Channel File 291 or any other
Channel File. 


REMEDIATION

The most up-to-date remediation recommendations and information can be found on
our blog or in the Support Portal. 

We understand that some customers may have specific support needs and we ask
them to contact us directly.

Systems that are not currently impacted will continue to operate as expected,
continue to provide protection, and have no risk of experiencing this event in
the future.

Systems running Linux or macOS do not use Channel File 291 and were not
impacted. 


ROOT CAUSE ANALYSIS

We understand how this issue occurred and we are doing a thorough root cause
analysis to determine how this logic flaw occurred. This effort will be ongoing.
We are committed to identifying any foundational or workflow improvements that
we can make to strengthen our process. We will update our findings in the root
cause analysis as the investigation progresses.

 

1 https://learn.microsoft.com/en-us/windows/win32/ipc/named-pipes

 * Tweet
 * Share



RELATED CONTENT

TO OUR CUSTOMERS AND PARTNERS




STATEMENT ON FALCON CONTENT UPDATE FOR WINDOWS HOSTS




CROWDSTRIKE UNIFIES THREAT DATA AND AI FOR NEXT-GEN MANAGED DETECTION AND
RESPONSE


Categories
 * Cloud and Application Security
   95
 * Counter Adversary Operations
   175
 * Endpoint Security & XDR
   305
 * Engineering & Tech
   77
 * Executive Viewpoint
   157
 * Exposure Management
   80
 * From The Front Lines
   189
 * Identity Protection
   34
 * Next-Gen SIEM & Log Management
   84
 * Public Sector
   36

CONNECT WITH US




FEATURED ARTICLES

Likely eCrime Actor Uses Filenames Capitalizing on July 19, 2024, Falcon Sensor
Content Issues in Operation Targeting LATAM-Based CrowdStrike Customers
July 20, 2024
Technical Details: Falcon Content Update for Windows Hosts
July 20, 2024
Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target
CrowdStrike Customers
July 19, 2024
To Our Customers and Partners
July 19, 2024

SUBSCRIBE

Sign up now to receive the latest notifications and updates from CrowdStrike.

Sign Up

SEE CROWDSTRIKE FALCON® IN ACTION

Detect, prevent, and respond to attacks— even malware-free intrusions—at any
stage, with next-generation endpoint protection.

See Demo
Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target
CrowdStrike Customers
Likely eCrime Actor Uses Filenames Capitalizing on July 19, 2024, Falcon Sensor
Content Issues in Operation Targeting LATAM-Based CrowdStrike Customers
 * 
 * 
 * 
 * 

 * Copyright © 2024 CrowdStrike
 * Privacy
 * Request Info
 * Blog
 * Contact Us
 * 1.888.512.8906
 * Accessibility


ABOUT COOKIES ON THIS SITE

In order to provide you with the most relevant content and best browser
experience, we use cookies to remember and store information about how you use
our website. See how we use this information in our Privacy Notice and more
information about cookies in our Cookie Notice.



COOKIE PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * TARGETING COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. This includes diagnostic functions such as identifying 404
errors and monitoring page load speed. They are usually only set in response to
actions made by you which amount to a request for services, such as setting your
privacy preferences, logging in or filling in forms. You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collet is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All