Just released 🎉: Malware analysis of IDAT (Hijack) Loader, its injection from IDAT (PNG file) streams, and how it uses Process Doppelganging.
This covers both dynamic and static analysis techniques which can be used to unravel the final payload.
Enjoy!
