<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2024-7262 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2024-7262/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 11:40:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2024-7262/feed.xml" rel="self" type="application/rss+xml"/><item><title>WPS Office Exploitation via DLL Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-11-wps-office-dll-hijack/</link><pubDate>Wed, 06 May 2026 11:40:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-wps-office-dll-hijack/</guid><description>The rule detects the loading of a remote library by the WPS Office promecefpluginhost.exe executable, which may indicate exploitation of CVE-2024-7262 or CVE-2024-7263 via DLL hijacking abusing the ksoqing custom protocol handler.</description><content:encoded><![CDATA[<p>This detection identifies potential exploitation of CVE-2024-7262 or CVE-2024-7263 in WPS Office through DLL hijacking. The attack abuses the ksoqing custom protocol handler and involves loading a remote library by the <code>promecefpluginhost.exe</code> executable. The rule specifically looks for DLLs loaded from suspicious locations, such as temporary directories (<code>AppData\\Local\\Temp\\wps\\INetCache</code>), device paths (<code>\\Device\\Mup\\</code>), or UNC paths (<code>\\\\*</code>). Successful exploitation could lead to arbitrary code execution. This activity has been observed as of August 2024, and defenders should be aware that exploitation may occur through specially crafted WPS files or links.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user opens a malicious WPS Office document or clicks a specially crafted link.</li>
<li>The <code>wps.exe</code> or <code>et.exe</code> process is launched to handle the document/link, potentially utilizing the &ldquo;ksoqing&rdquo; protocol.</li>
<li>The WPS Office application attempts to load a plugin via <code>promecefpluginhost.exe</code>.</li>
<li>Due to a DLL hijacking vulnerability (CVE-2024-7262 or CVE-2024-7263), <code>promecefpluginhost.exe</code> attempts to load a malicious DLL from a non-standard location such as <code>AppData\\Local\\Temp\\wps\\INetCache</code>, <code>\\Device\\Mup\\</code>, or a UNC path.</li>
<li>The malicious DLL is loaded into the <code>promecefpluginhost.exe</code> process.</li>
<li>The malicious DLL executes arbitrary code within the context of the <code>promecefpluginhost.exe</code> process.</li>
<li>The attacker gains control of the compromised process and can perform actions such as downloading further malware, establishing persistence, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows for arbitrary code execution within the context of the WPS Office application. This can lead to a complete compromise of the user&rsquo;s system, including data theft, installation of malware, and lateral movement within the network. There is no specific information on the number of victims or sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;WPS Office Exploitation via DLL Hijack - Library Load&rdquo; to your SIEM to detect suspicious DLL loads by <code>promecefpluginhost.exe</code> (see rule below).</li>
<li>Deploy the Sigma rule &ldquo;WPS Office Exploitation via DLL Hijack - Image Load&rdquo; to your SIEM to detect suspicious image loads by <code>promecefpluginhost.exe</code> (see rule below).</li>
<li>Monitor network connections originating from <code>promecefpluginhost.exe</code> for suspicious outbound traffic.</li>
<li>Upgrade WPS Office to a vendor-supported release that remediates both CVE-2024-7262 and CVE-2024-7263.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) to enhance visibility into DLL loading events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dll-hijacking</category><category>wps-office</category><category>cve-2024-7262</category><category>cve-2024-7263</category><category>execution</category><category>initial-access</category></item></channel></rss>