The easiest way to perform a malicious Android application analysis is to run it in a controlled environment. You already know how to run an emulator and install applications via ADB, so you may install a suspicious application in a clean virtual system and see what artefacts are left after you run it. For example, you can find SQLite databases with data collected by a malicious application or its configuration files.
Dynamic analysis of malicious Android applications
Dynamic analysis using an online sandbox
An easier and more efficient approach is to use pre-built sandboxes for malware analysis. One of these sandboxes is Joe Sandbox. It supports automated dynamic analysis of different types of applications, including Windows...