Often, malware analysis is taught by wading knee deep in obfuscated code. Most beginners haven’t developed the “spidey-sense” that allows them to separate the signal from the noise, leading to frustration and slow progress. This talk is intended as an introduction to malware analysis on Windows and will walk through patterns in script and binary based malware using small “toy” examples, red team frameworks, and in-the-wild samples.