This document outlines procedures for analyzing malicious PDFs, Office documents, and executables through static malware analysis. It describes using tools like Olevba.py to analyze Office documents for malicious macros, Pyew.py to disassemble files, strings to extract text, and UPX to unpack executables. It provides an example analysis of a malicious PDF containing obfuscated JavaScript, Office documents containing VBScript to open notepad.exe, and a keylogging executable packed with UPX and encoded with XOR. Indicators of compromise like domain names and files are extracted to provide to further analysis.