Skip to content
Go to file

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time


A very suspicious piece of software - to test the effectiveness of heuristic AV engines/HIPS's/other magic.

After the Hacktivity presentation I was pointed to Matousec's toolkit that basically has the same purpose as Heureka. This project will probably be abandoned.


Tasks are model implementations of typical malware behaviour. They can be seen as micro-modules that can be switched on and off in order to find out if a product detects some specific behaviour.

  • Evasion
    • VirtualAlloc() WX
      • Execute code
      • Encrypt/Decrypt
        • XOR obfuscation
        • Some standard algorithm, maybe RC4 [TODO]
        • Key derived from environment variables [TODO]
    • Detect virtualization [TODO]
    • Turn off AV [TODO]
    • Environment-based behaviour [TODO]
      • Current time
      • Environment variables (see Encryption)
      • CWD, ARGV, username
    • Digital signatures [TODO]
  • Data Acquisition
    • DLL injection
      • Registry
      • Hooks
      • Key logging
      • CreateRemoteThread
      • Reflective DLL injection [TODO]
    • Look for office documents, PDFs
    • Install browser extensions [TODO]
      • Firefox
      • Chrome
    • Get SYSTEM [TODO]
    • Cached domain credentials dump [TODO]
    • Dump LSA secrets [TODO]
      • Wlx* exports
  • Communication
    • Turn off Windows firewall [TODO]
    • Save log to %TEMP%
    • Communicate via HTTP
      • Through configured proxy
      • Encrypted connection (HTTPS) [TODO]
      • ICMP tunneling [TODO]
      • DNS tunneling [TODO]
    • Connect back shell [TODO]
  • Persistence
    • Set autostart
      • Registry
      • Startup folder [TODO]
    • SvcHost DLL [TODO]
    • Download, store and execute [TODO]
    • Register service [TODO]
    • Set up WBEM scripts [TODO]
    • Change hosts file
    • Change DNS [TODO]


The purpose of this software is to test the behavior-based capabilities of anti-virus/HIDS/other software, not to evade detection, so the tasks performed by heureka should not aim evasion but the realistic yet harmless implementation of real-world tactics. However, it should be noted that some evasion techniques can also be indicators of malicious behaviour, and they should be implemented as well.

Shellcode can be arbitrarily complex and can perform unpredictable actions. Typical shellcode behaviour should be implemented in Tasks. If shellcode injection/decoding/etc. is needed, it is recommended to use some simple, harmless code (like the MsgBox provided).

Feature Requirements

  • Native executable (PE)
    • Easily convertable to DLL [TODO]
  • Configurable / Modular
    • Command line [TODO]
    • Source code

Coding Guidelines

  • Task functions return void
  • Output should be provided through the print_XXX() functions
  • Task function should clean up after themselves (memory, file handles etc.)



A toolset to assess the behavioral capabilities of AV/HIPS software



No releases published


No packages published


You can’t perform that action at this time.