IoC Scan : DHS Emergency Directive 21-01 - SolarWinds v2
Log In or Register to download the BES file, and more.

2 Votes

Versioning - This is the latest version.

1IoC Scan : DHS Emergency Directive 21-01 - SolarWInds v112/14/2020 8:36:25 AM
2IoC Scan : DHS Emergency Directive 21-01 - SolarWinds v112/14/2020 8:57:30 AM
3IoC Scan : DHS Emergency Directive 21-01 - SolarWinds v112/18/2020 12:52:55 PM
4IoC Scan : DHS Emergency Directive 21-01 - SolarWinds v212/21/2020 8:08:40 AM


v2: Add scan for app_web_logoimagehandler.ashx.b6031896.dll

v1: Scan for SolarWinds.Orion.Core.BusinessLayer.dll in any path, and netsetupsvc.dll at \windows\syswow64

Scan for the referenced files.

Save any detected paths to BES Client\BPS-Scans\ED21-01




BigFix Forum Technical Discussion


Method 1 Detection Relevance and Analysis:


Method 2 Scan Task and Analysis:


Emergency Directive 21-01

December 13, 2020

Mitigate SolarWinds Orion Code Compromise

This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 21-01, “Mitigate SolarWinds Orion Code Compromise”.

Section 3553(h) of title 44, U.S. Code, authorizes the Secretary of Homeland Security, in response to a known or reasonably suspected information security threat, vulnerability, or incident that represents a substantial threat to the information security of an agency, to “issue an emergency directive to the head of an agency to take any lawful action with respect to the operation of the information system, including such systems used or operated by another entity on behalf of an agency, that collects, processes, stores, transmits, disseminates, or otherwise maintains agency information, for the purpose of protecting the information system from, or mitigating, an information security threat.” 44 U.S.C. § 3553(h)(1)–(2)

Section 2205(3) of the Homeland Security Act of 2002, as amended, delegates this authority to the Director of the Cybersecurity and Infrastructure Security Agency. 6 U.S.C. § 655(3).

Federal agencies are required to comply with these directives. 44 U.S.C. § 3554 (a)(1)(B)(v)

These directives do not apply to statutorily-defined “national security systems” nor to systems operated by the Department of Defense or the Intelligence Community. 44 U.S.C. § 3553(d), (e)(2), (e)(3), (h)(1)(B).


SolarWinds Orion products (affected versions are 2019.4 through 2020.2.1 HF1) are currently being exploited by malicious actors. This tactic permits an attacker to gain access to network traffic management systems. Disconnecting affected devices, as described below in Required Action 2, is the only known mitigation measure currently available.

CISA has determined that this exploitation of SolarWinds products poses an unacceptable risk to Federal Civilian Executive Branch agencies and requires emergency action. This determination is based on:

  • Current exploitation of affected products and their widespread use to monitor traffic on major federal network systems;

  • High potential for a compromise of agency information systems;

  • Grave impact of a successful compromise.

CISA understands that the vendor is working to provide updated software patches. However, agencies must wait until CISA provides further guidance before using any forthcoming patches to reinstall the SolarWinds Orion software in their enterprise.

Please refer to the MITRE ATT&CK framework for possible tactics the threat actors are using to maintain persistence in the environment.

Required Actions

This emergency directive requires the following actions:

  1. Agencies that have the expertise to take the following actions immediately must do so before proceeding to Action 2. Agencies without this capability shall proceed to Action 2.

    a. Forensically image system memory and/or host operating systems hosting all instances of SolarWinds Orion versions 2019.4 through 2020.2.1 HF1]. Analyze for new user or service accounts, privileged or otherwise.

    b. Analyze stored network traffic for indications of compromise, including new external DNS domains to which a small number of agency hosts (e.g., SolarWinds systems) have had connections.

  1. Affected agencies shall immediately disconnect or power down SolarWinds Orion products, versions 2019.4 through 2020.2.1 HF1, from their network. Until such time as CISA directs affected entities to rebuild the Windows operating system and reinstall the SolarWinds software package, agencies are prohibited from (re)joining the Windows host OS to the enterprise domain. Affected entities should expect further communications from CISA and await guidance before rebuilding from trusted sources utilizing the latest version of the product available. Additionally:

    a. Block all traffic to and from hosts, external to the enterprise, where any version of SolarWinds Orion software has been installed.

    b. Identify and remove all threat actor-controlled accounts and identified persistence mechanisms.

  1. By 12pm Eastern Standard Time on Monday December 14, 2020 agencies shall report as an incident to CISA (at the existence of any of the following:

    a. [SolarWinds.Orion.Core.BusinessLayer.dll] with a file hash of [b91ce2fa41029f6955bff20079468448]

    b. [C:\WINDOWS\SysWOW64\netsetupsvc.dll]

    c. Other indicators related to this issue to be shared by CISA

  1. After (and only after) all threat actor-controlled accounts and identified persistence mechanisms have been removed:

    a. Treat all hosts monitored by the SolarWinds Orion monitoring software as compromised by threat actors and assume that further persistence mechanisms have been deployed.

    b. Rebuild hosts monitored by the SolarWinds Orion monitoring software using trusted sources.

    c. Reset all credentials used by or stored in SolarWinds software. Such credentials should be considered compromised.

    d. Take actions to remediate kerberoasting, including, as necessary or appropriate, engaging with a 3rd party with experience eradicating APTs from enterprise networks. For Windows environments, refer to the following:

  2. By 12pm Eastern Standard Time on Monday December 14, 2020, submit a report to CISA using the provided template. Department-level Chief Information Officers (CIOs) or equivalents must submit completion reports attesting to CISA that the affected devices were either disconnected or powered down.

These requirements apply to any agency network utilizing the SolarWinds Orion product. This includes any information system used or operated by another entity on behalf of an agency, that collects, processes, stores, transmits, disseminates, or otherwise maintains agency information.

CISA Actions

  • CISA will continue to work with our partners to monitor for active exploitation associated with this vulnerability. CISA will release additional indicators of compromise as they become available.

  • CISA will provide additional guidance to agencies via the CISA website, through an emergency directive issuance coordination call, and through individual engagements upon request (via


This emergency directive remains in effect until all agencies have applied the forthcoming patch or the directive is terminated through other appropriate action.

Additional Information

Frequently Asked Questions

Answers to common questions appear below.

What does the directive mean by “expertise”?

By “expertise”, we mean that you have staff or supporting personnel that are properly trained in taking a forensic image of system memory and have tooling readily-available to immediately do so.

Property Details

TitleIoC Scan : DHS Emergency Directive 21-01 - SolarWinds v2
Source Release Date12/14/2020 12:00:00 AM
KeywordsSolar Winds Orion ED21-01 SolarWinds.Orion.Core.BusinessLayer.dll DHS Sunburst
Is TaskTrue
Added by on 12/21/2020 8:08:40 AM
Last Modified by on 12/21/2020 8:08:40 AM
Counters 3473 Views / 27 Downloads
User Rating 1 star 2 star 3 star 4 star 5 star * Average over 0 ratings. ** Log In or Register to add your rating.


Used in 19 fixlets and 16 analyses   * Results in a true/false
Show indented relevance
windows of operating system AND (if exists property "in proxy agent context" then not in proxy agent context else true)


Action 1 (default)

Action Link Click here to deploy this action.
Script Type BigFix Action Script
parameter "ListFile"="{pathname of storage folder of client}\BPS-Scans\ED21-01\file_listing.txt"

folder create "{pathname of storage folder of client}\BPS-Scans\ED21-01"
delete __createfile
createfile until EOF_EOF_EOF
REM Check for C:\WINDOWS\SysWOW64\netsetupsvc.dll
dir /b {pathname of windows folder}\SysWOW64\netsetupsvc.dll >> "{parameter "ListFile"}" 2>NUL
REM Detect SolarWinds.Orion.Core.BusinessLayer.dll in any path - hash calculations will come later
{concatenation "%0d%0a" of ("dir /s /b " & it & "\SolarWinds.Orion.Core.BusinessLayer.dll " & it & "\app_web_logoimagehandler.ashx.b6031896.dll >> %22" & (parameter "ListFile") & "%22 2>NUL") of names of drives whose (type of it = "DRIVE_FIXED")}
echo SCAN_COMPLETE %DATE% %TIME% >> "{parameter "ListFile"}"

delete run_scan.cmd
move __createfile run_scan.cmd

// Clear any previous scan output
delete "{parameter "ListFile" of action}"

action uses wow64 redirection false
//the scan will continue to run in the background
runhidden cmd.exe /c run_scan.cmd
Success Criteria

This action will be considered successful when the applicability relevance evaluates to false.

Action 2

Action Link Click here to review this task in the Content Database.
Script Type URL


Social Media:
Share this page on Yammer


Log In or Register to leave comments!