Using x64dbg to trace the decryption routines. The challenge often requires "dumping" decrypted buffers from memory for further inspection.
Independent researchers often post highly detailed blogs on these challenges. 7xisHeadTrick.zip
A "good" write-up for this challenge typically follows these stages: Using x64dbg to trace the decryption routines