# Investigation into PlugX Uncovers Unique APT Technique **[trendmicro.com/en_us/research/21/a/xdr-investigation-uncovers-plugx-unique-technique-in-apt-attack.html](https://www.trendmicro.com/en_us/research/21/a/xdr-investigation-uncovers-plugx-unique-technique-in-apt-attack.html)** January 20, 2021 [Advanced persistent threats (APT) are known — and are universally dreaded — for their](https://www.trendmicro.com/vinfo/tmr/?/us/security/definition/advanced-persistent-threat#:~:text=Advanced%20persistent%20threat%20%5BAPT%5D%20is,found%20in%20the%20cybercriminal%20underground.) stealth. Actors behind such attacks actively innovate their techniques to evade detection and ensure that they maintain a foothold inside an environment as long as possible. Through the [Apex One with Endpoint Sensor (iES), we discovered one such incident wherein an attacker](https://www.trendmicro.com/en_us/business/products/detection-response/xdr.html) utilized sophisticated techniques in an attempt to exfiltrate sensitive information from a company. The unique tactics, techniques, and procedures (TTPs) used in this attack [highlight the importance of cross-layered detection and response solutions.](https://www.trendmicro.com/en_us/what-is/xdr.html) ## Technical analysis **Detection** We noticed the execution of schtasks.exe with the command line parameter “schtasks _/create /tn c:\programdata\\.bat /sc /once /st