In this talk we present a short and hopefully gentle introduction to Malware Analysis by dissecting a Word document that you may find attached to a typical phishing e-mail. We argue that this type of investigation is a fun and useful way to learn basic Reverse Engineering.