Common techniques include Uploading suspicious executables to VirusTotal, Finding strings, How to check if a malware code is obfuscated or not, Information gathering from Portable Executable (PE) file format amongst others.
Read the full article here – http://resources.infosecinstitute.com/malware-analysis-basics-static-analysis/