Attack  How to Do Malware Analysis?

How to Do Malware Analysis?