Cited from: https://redteamleaders.coursestack.com/courses/3e9e0212-81dc-49ed-9233-ec9ca894fc6a/take/11---detection-types-signature-heuristic-behavioral-and-machine-learning
Heuristic detection involves static and dynamic rule-based checks on code, looking for suspicious attributes or behaviors.
Uses predefined rules or YARA-like pattern checks.
Looks for suspicious constructs:
API usage (e.g., VirtualAllocEx, WriteProcessMemory).
Anomalous section names or permissions (.text marked as RWX).
High entropy suggesting encryption or packing.
PE file with a small .text section and a large .data section.
Use of IsDebuggerPresent() API.
Non-standard file headers or altered PE metadata.
May lead to false positives.
Bypassable with randomized structure, renaming sections, or using legitimate Windows APIs in controlled ways.
Padding payloads to reduce entropy.
API call obfuscation or delay loading.
Splitting malicious logic across multiple stages.
Last updated 8 months ago