Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 182796 Cookbook: browseurl.jbs Time: 11:09:30 Date: 15/10/2019 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report https://ziad-w-hammad-dot-yamm-track.appspot.com 4 Overview 4 General Information 4 Detection 5 Confidence 5 Classification 5 Analysis Advice 6 Mitre Att&ck Matrix 6 Signature Overview 7 Phishing: 7 Networking: 7 System Summary: 7 Malware Analysis System Evasion: 7 HIPS / PFW / Operating System Protection Evasion: 7 Behavior Graph 8 Simulations 8 Behavior and APIs 8 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 10 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Screenshots 10 Thumbnails 10 Startup 11 Created / dropped Files 11 Domains and IPs 39 Contacted Domains 39 URLs from Memory and Binaries 39 Contacted IPs 41 Public 41 Static File Info 42 No static file info 42 Network Behavior 42 Network Port Distribution 42 TCP Packets 42 UDP Packets 43 DNS Queries 44 DNS Answers 44 HTTPS Packets 44 Code Manipulations 44 Statistics 44 Behavior 44 Copyright Joe Security LLC 2019 Page 2 of 46 System Behavior 45 Analysis Process: iexplore.exe PID: 2676 Parent PID: 700 45 General 45 File Activities 45 Registry Activities 45 Analysis Process: iexplore.exe PID: 1860 Parent PID: 2676 45 General 45 File Activities 46 Registry Activities 46 Disassembly 46 Copyright Joe Security LLC 2019 Page 3 of 46 Analysis Report https://ziad-w-hammad-dot-yamm-track.appspot.com Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 182796 Start date: 15.10.2019 Start time: 11:09:30 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 6m 21s Hypervisor based Inspection enabled: false Report type: light Cookbook file name: browseurl.jbs Sample URL: https://ziad-w-hammad-dot-yamm- track.appspot.com Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 9 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: EGA enabled AMSI enabled Analysis stop reason: Timeout Detection: MAL Classification: mal48.phis.win@3/189@2/28 Cookbook Comments: Adjust boot time Enable AMSI Browsing link: https://sites.g oogle.com/site/scriptsexamples/ Browsing link: https://sites.g oogle.com/site/scriptsexamples/home/news Browsing link: https://sites.g oogle.com/site/scriptsexamples/available-web- apps/awesome-tables Browsing link: https://support.awesome- table.com/hc/en-us Browsing link: https://sites.g oogle.com/site/scriptsexamples/available-web- apps/awesome-tables/demos Browsing link: https://sites.g oogle.com/site/scriptsexamples/available-web- apps/awesome-tables/add-ons Browsing link: https://plus.go ogle.com/communities/117434057513505498243 Browsing link: https://sites.g oogle.com/site/scriptsexamples/customers Browsing link: https://support.awesome- table.com/hc/en-us/co mmunity/topics/115000043385 Browsing link: https://support.awesome- table.com/hc/en-us/articles/360000251129 Browsing link: https://sites.g oogle.com/site/scriptsexamples/available-web- apps/awesome-tables/terms-of-service Copyright Joe Security LLC 2019 Page 4 of 46 Warnings: Show All Exclude process from analysis (whitelisted): dllhost.exe, ielowutil.exe, conhost.exe, CompatTelRunner.exe Created / dropped Files have been reduced to 100 Excluded IPs from analysis (whitelisted): 104.108.44.35, 67.26.73.254, 67.27.234.126, 67.27.157.126, 8.248.115.254, 8.248.113.254, 216.58.201.78, 172.217.23.227 Excluded domains from analysis (whitelisted): e11290.dspg.akamaiedge.net, ssl.gstatic.com, go.microsoft.com, go.microsoft.com.edgekey.net, audownload.windowsupdate.nsatc.net, sites.google.com, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.n et Report size exceeded maximum capacity and may have missing behavior information. Report size getting too big, too many NtCreateFile calls found. Report size getting too big, too many NtDeviceIoControlFile calls found. Report size getting too big, too many NtQueryAttributesFile calls found. Detection Strategy Score Range Reporting Whitelisted Threat Detection Audio Threshold 48 0 - 100 false Phisher Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Copyright Joe Security LLC 2019 Page 5 of 46 Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis Mitre Att&ck Matrix Privilege Defense Credential Lateral Command and Initial Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Valid Accounts Windows Winlogon Process Web Service 1 Credential Process Application Data from Local Data Web Service 1 Remote Helper DLL Injection 1 Dumping Discovery 1 Deployment System Encrypted 1 Management Software Replication Service Port Monitors Accessibility Process Network Security Remote Data from Exfiltration Over Standard Through Execution Features Injection 1 Sniffing Software Services Removable Other Network Cryptographic Removable Discovery 1 Media Medium Protocol 2 Media Copyright Joe Security LLC 2019 Page 6 of 46 Privilege Defense Credential Lateral Command and Initial Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Drive-by Windows Accessibility Path Rootkit Input File and Windows Data from Automated Standard Non- Compromise Management Features Interception Capture Directory Remote Network Shared Exfiltration Application Instrumentation Discovery 1 Management Drive Layer Protocol 2 Exploit Public- Scheduled Task System DLL Search Obfuscated Credentials System Network Logon Scripts Input Capture Data Encrypted Standard Facing Firmware Order Hijacking Files or in Files Configuration Application Application Information Discovery Layer Protocol 2 Signature Overview • Phishing • Networking • System Summary • Malware Analysis System Evasion • HIPS / PFW / Operating System Protection Evasion Click to jump to signature section Phishing: Yara detected Audio Phisher Networking: Social media urls found in memory data Found strings which match to known social media urls Performs DNS lookups Urls found in memory or binary data Uses HTTPS System Summary: Classification label Creates files inside the user directory Creates temporary files Reads ini files Sample might require command line arguments Spawns processes Found GUI installer (many successful clicks) Found graphical window changes (likely an installer) Uses new MSVCR Dlls Malware Analysis System Evasion: May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) HIPS / PFW / Operating System Protection Evasion: Copyright Joe Security LLC 2019 Page 7 of 46 May try to detect the Windows Explorer process (often used for injection) Behavior Graph Hide Legend Behavior Graph Legend: ID: 182796 Process URL: https://ziad-w-hammad-dot-y... Signature Startdate: 15/10/2019 Created File Architecture: WINDOWS Score: 48 DNS/IP Info Is Dropped Is Windows Process Yara detected Audio started Number of created Registry Values Phisher Number of created Files Visual Basic Delphi iexplore.exe Java .Net C# or VB.NET 26 87 C, C++ or other language Is malicious started Internet iexplore.exe 10 318 104.16.53.111 104.16.86.20 unknown unknown 27 other IPs or domains dropped United States United States C:\Users\user\AppData\Local\...\Y827I32K.htm, HTML Simulations Behavior and APIs No simulations Antivirus, Machine Learning and Genetic Malware Detection Initial Sample No Antivirus matches Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains Copyright Joe Security LLC 2019 Page 8 of 46 No Antivirus matches URLs Source Detection Scanner Label Link www.mercadolivre.com.br/ 0% Avira URL Cloud safe www.merlin.com.pl/favicon.ico 0% URL Reputation safe www.dailymail.co.uk/ 0% URL Reputation safe https://sites.gooRoot 0% Avira URL Cloud safe https://sites.goom/communities/117434057513505498243b-apps/awesome-tables/add- 0% Avira URL Cloud safe onib/query/?v=309 getbootstrap.com) 0% URL Reputation safe busca.igbusca.com.br//app/static/images/favicon.ico 0% URL Reputation safe https://sites.gooom/site/scriptsexamples/ailable-web-apps/mail-merge/Root 0% Avira URL Cloud safe www.etmall.com.tw/favicon.ico 0% URL Reputation safe it.search.dada.net/favicon.ico 0% URL Reputation safe search.hanafos.com/favicon.ico 0% URL Reputation safe googleappsdeveloper.blogspot.fr/2011/10/4-ways-to-do-mail-merge-using-google.html 0% Avira URL Cloud safe cgi.search.biglobe.ne.jp/favicon.ico 0% Avira URL Cloud safe ocsp.pki.goog/gts1o10 0% URL Reputation safe search.msn.co.jp/results.aspx?q= 0% URL Reputation safe buscar.ozu.es/ 0% Avira URL Cloud safe ocsp.pki.goog/gsr202 0% URL Reputation safe https://pki.goog/repository/0
Recommended publications
  • Roboto Italic It Is a Google Font, Universally Accessible and Optimized for All Print and Digital Needs
    Identity Guidelines 1. Logos 2. Palettes + Swatches 3. Fonts 4. Amplify 5. Programs V2-Jan 2019 1. The Logos PRIMARY LOGO Logos The Primary Logo for ILHIGH is the version with White Type and Bright Teal “bubble”. While there are many color versions of the logo available, this version is the Primary Logo and the representational mark for ILHIGH as a whole. For Black and White, the logo version with White Type and Black bubble is the primary logo. Bright Teal Pantone 7716 C Pantone 7716 U CMYK 85, 17, 40, 0 RGB 7, 157, 161 HEX 079DA1 1. The Logos BRAND NAME Logos • When referring to the brand name it must always be: I Live Here I Give Here • Ever word has an initial capitalization and there is no comma after “Here” • After writing out I Live Here I Give Here, the brand name can subsequently be shortened to ILHIGH • Incorrect versions are: I LIVE HERE I GIVE HERE I Live Here, I Give Here 1. The Logos Logos LOGO VARIATIONS Solid The ILHIGH logo is intended to be playful and have personality, so a combination of any of the three brand colors (Bright Teal, Dark Teal, Amplify Green) and White is encouraged. This includes “reversed out” versions (White or light bubble on darker background), and Bubble outline options. Reversed Outline + Reversed Outline 1. The Logos LOGO VARIATIONS Logos Black and White Variations of the logo. 1. The Logos LOGO “BUG” Logos The Logo Bug is a truncated, simplified version of the ILHIGH logo. This is intended only for use in small spaces when the regular, full version of the logo will lose its legibility.
    [Show full text]
  • NAVY CYP HIRING EVENT Quick Guide
    MAKE A DIFFERENCE. / BUILD A CAREER. NAVY CYP HIRING EVENT Quick Guide Rikki Leigh, MSHR N926 Career Manager Commander Navy Installations Command 5720 Integrity Drive Millington, TN 38055 (P) 901-874-6692 (DSN) 882-6692 (C) 901-600-9515 (F) 901-874-6823 WE CARE ABOUT OUR FAMILIES. WE CARE ABOUT OUR TEAM. WWW.NAVYCYP.ORG NAVY CYP HIRING EVENT This Quick Guide is an overview of all the marketing resources available for installations hosting a Navy CYP Hiring Event. All resources within the CYP Hiring Event Marketing Toolkit are available for download as original artwork and viewable. Local customization is authorized within the fields indicated to reflect dates, locations, times, and online information for CYP Hiring Events. Additional download options are indicated within this document. The CYP Hiring Event coordinator will work with the installation’s Marketing Office to plan a hiring event and develop a marketing plan for outreach to applicants. More information on planning a Navy CYP Hiring Event can be found in the Guide to Navy Child and Youth Programs (CYP) Hiring Events Toolkit. CYP Hiring Event Marketing Toolkit link: http://www.navymwr.org/resources/marketing/cyp/cyp-hiring-event-marketing-toolkit/ Navy Child and Youth Programs (CYP) Hiring Events Toolkit: https://elibrary.cnic-n9portal.net/document-library/?id=2295 2 Navy CYP Hiring Event - QUICK GUIDE NAVY CYP HIRING EVENT B10/17-02 PRIMARY COLORS Black Saffron Mango Cello Steel Blue Charcoal C 0 R 0 C 1 R 250 C 95 R 40 C 81 R 60 C 68 R 66 M 0 G 0 M 22 G 200 M 79 G 69 M 53 G
    [Show full text]
  • Roboto Installation Instructions
    Roboto Installation Instructions works with the Google Assistant Please read and save these instructions before installation DO NOT RETURN TO STORE 2 Roboto Instructions FR-W1910 General Inquiries For all questions about your ceiling fan please read all included instructions, installation procedures, troubleshooting guidelines and warranty information before starting installation. For missing parts or general inquiries call our trained technical staff at: 1-866-810-6615 option 0 MON-FRI 8AM-8PM EST Email: [email protected] Or live chat at modernforms.com Fan Support For fast service have the following information below when you call: 1. Model Name and Number 2. Part Number and Part Description 3. Date Of Purchase and Purchase Location 1-866-810-6615 option 1 MON-FRI 8AM-8PM EST Email: [email protected] FR-W1910 Roboto Instructions 3 Safety Rules For operation, maintenance, and troubleshooting information, visit http://modernforms.com/fan-support/ To reduce the risk of electric shock, ensure electricity has been turned off at the circuit breaker before beginning. All wiring must be in accordance with the National Electrical Code “ANSI/NFPA 70” and local electrical codes. Electrical installation should be performed by a licensed electrician. The fan must be mounted with a minimum of 7 ft. (2.1m) clearance from the trailing edge of the fan blades to the floor and a minimum of 1.5 ft (0.5m) from the edge of the fan blades to the surrounding walls. Never place objects in the path of the fan blades. To avoid personal injury or damage to the fan and other items, please be cautious when working around or cleaning the fan.
    [Show full text]
  • Téléchargez GAFAM Naked 1-Google
    <GAFAM NAKED 1/5><https://www.google.fr><10012018-archived by Stéphane Bataillon – https://www.stephanebataillon.com> <!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="fr"><head><meta content="/images/branding/googleg/1x/googleg_standard_color_128dp.png" itemprop="image"><link href="/images/branding/product/ico/googleg_lodp.ico" rel="shortcut icon"><meta content="origin" name="referrer"><title>Google</title> <script>(function() {window.google={kEI:'cZVWWtjPGo3TkgXVpK3gAw',kEXPI:'1352552,1354276,1354915,1355 217,1355528,1355675,1355762,1355792,1356039,1356470,1356722,1356778,1356854,1356 947,1357038,1357219,1357270,3700316,3700521,4029815,4031109,4038214,4038394,4041 776,4043492,4045096,4045293,4045841,4047140,4047454,4048347,4048980,4050750,4051 887,4056126,4056682,4058016,4061666,4061980,4062724,4064468,4064796,4069829,4078 588,4079609,4079611,4080760,4081038,4081165,4082230,4082850,4082858,4086737,4095 910,4097153,4097922,4097929,4098721,4098728,4098752,4102237,4103473,4103845,4104 202,4106084,4106647,4109293,4109316,4109490,4110086,4110931,4115624,4116351,4116 550,4116724,4116731,4116926,4116935,4117539,4117980,4118798,4120660,4120911,4121 518,4122511,4123645,4124091,4124850,4125837,4126204,4126754,4127262,4127307,4127 474,4127863,4128586,4128624,4129001,4129520,4129555,4129633,4129722,4131247,4131 370,4131834,4133114,4133755,4133797,4133876,4134398,4135025,4135088,4135210,4135 404,4135934,4136073,4137461,4137596,4137646,4140786,4141390,4141601,4142071,4142 328,4142420,4142443,4142511,4142513,4142515,4142582,4142729,4142829,4142836,4142
    [Show full text]
  • Progressive Web Applications
    Bachelor’s thesis Degree programme in Information and Communications Technology 2019 Archana Karki PROGRESSIVE WEB APPLICATIONS - Powerful websites, functional as native mobile apps BACHELOR’S THESIS | ABSTRACT TURKU UNIVERSITY OF APPLIED SCIENCES Degree programme in Information and Communication Technology 2019| 60 pages Archana Karki PROGRESSIVE WEB APPS • Powerful websites, usable as native mobile apps Current web platform and browsers are adequately powerful to support mobile and desktop applications. Application Program Interfaces (APIs) that supports the integration of mobile device and web browsers can execute features such as notifications, push messages, home screen icon, device camera and so on. The concept of progressive web apps is to make regular websites functional as mobile and desktop app, without compromising the user experience of traditionally used native apps. In order to understand the concept of Progressive Web Apps (PWAs), a functional app was created using HTML, CSS, JavaScript, along with the manifest file, service workers, and web APIs. The primary objective of the thesis was to understand and implement the technologies of Progressive Web Applications (PWAs). Hence, a detailed study of the topic and development of a PWA was also carried out. The study showed that one PWA could serve the function of a website, mobile app and a desktop app efficiently. On one hand, the technology used for making a PWA is not too complicated for web developers using HTML, CSS, and JavaScript, and on the other hand, simple files can turn an existing HTTPS website into a fully functional app, saving the cost of developing a new native app. KEYWORDS: Web apps, web, native apps, hybrid app, service workers, app shell, cache API, device integration and notification API.
    [Show full text]
  • Oracle Banking Digital Experience User Interface Reference Style Guide Release 20.1.0.0.0
    Oracle Banking Digital Experience User Interface Reference Style Guide Release 20.1.0.0.0 Part No. F30659-01 | May 2020 User Interface Reference Style Guide May 2020 Oracle Financial Services Software Limited Oracle Park Off Western Express Highway Goregaon (East) Mumbai, Maharashtra 400 063 India Worldwide Inquiries: Phone: +91 22 6718 3000 Fax:+91 22 6718 3001 www.oracle.com/financialservices/ Copyright © 2006, 2020, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are “commercial computer software” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate failsafe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.
    [Show full text]
  • Live Tweet Map with Sentimental Analysis A
    LIVE TWEET MAP WITH SENTIMENTAL ANALYSIS A Master’s Project Presented to Department of Computer and Information Sciences SUNY Polytechnic Institute Utica, New York In Partial Fulfilment Of the Requirements for the Master of Science Degree by Rohila Kotrika May 2016 © Rohila Kotrika 2016 1 LIVE TWEET MAP WITH SENTIMENTAL ANALYSIS Except where reference is made to the work of others, the work described here is my own or was done in collaboration with my advisor and/or the members of the advisory committee. Further, the content of this work is truthful in regards to my own work and the portrayal of other’s work. This work, I claim, does not include proprietary or classified information. _____________________________________ Rohilaohila KotrikaKotrika 3 Abstract This project basically aims to build a system for the real-time analysis of the trends and public views around the whole world by storing and analyzing the stream of tweets from the Twitter live API which produces a huge amount of data [36] . The tweets, tweet ID, time and other relevant elements are stored into a database and are represented in a map that is being updated in near real time with the help of Google map API [38]. This project also aims to achieve the sentimental analysis of the tweets by sending the tweets to the natural language processing API [39] which in turn processes the tweets using the natural language processing and gives a result If those tweets are positive, negative or neutral in nature. The map clusters tweet as to show where people are tweeting most from according to the sample tweets we get from the streaming API [35].
    [Show full text]
  • Sams Teach Yourself Android™ Application Development in 24 Hours , Fourth Edition
    Praise for Sams Teach Yourself Android™ Application Development in 24 Hours , Fourth Edition “This latest edition of Sams Teach Yourself Android Application Development in 24 Hours is just what you’ve been waiting for if you’ve been waiting to get into Android development. Freshly updated with what you need to know for developing applications using Android Studio for Android Lollipop (Android 5) with Material Design, this book covers what you need to know to get started building applications for Android.” —Ray Rischpater , Author and Engineering Manager at Microsoft “The new edition of Sams Teach Yourself Android Application Development in 24 Hours covers a lot of new features. The book takes you from the beginning through to uploading your own app into the store. All the screen shots in this edition use the new and official Android IDE (the amazing Android Studio IDE).” — Fady A. M. Ibrahim , Android Instructor, Benha Faculty of Computer and Information “Any developer who wants to get up to speed quickly on Android will appreciate this intro- duction. Beyond the SDK fundamentals, there’s plenty of good information on the things real-world Android apps are made of, such as maps, images, and navigation. This is a great way to dive head-first into Android development, or just to become Android-literate in record time.” — Jonathan Taylor , VP, Mobile Technology, Priceline.com The authors knock it out of the park for new Android developers and experienced ones who want to extend their prowess. This book is perfectly set-up for a sports technology oriented person like me to teach me the basic principles, give me design knowledge, and then cap that off with how to add and manipulate data.
    [Show full text]
  • Branding and Style Guide
    Branding & Style Guide 1.1.1 Branding and Style Guide ©Cinnafilm Inc. 2019 Vision Statement Branding & Style Guide 1.1.1 WE BUILD REVOLUTIONARY TOOLS TO HELP YOU CREATE EXTRAORDINARY MOVING IMAGES pg. 2 ©Cinnafilm Inc. 2018 Table of Contents Branding & Style Guide 1.1.1 Contents Products . .21 Vision Statement ................................. 2 Overview ....................................... 23 Table of Contents................................. 3 Tachyon........................................ 24 Dark Energy..................................... 25 Logo . 4 Wormhole . 26 Overview ........................................ 5 RadiantGrid ..................................... 27 Color Version . 6 Xenon . 28 Color Version Reversed ............................ 7 PixelStrings..................................... 29 Grayscale Version . 8 Black & White Bitmap . 9 Safe Area....................................... 10 Tagline......................................... 11 ]Do Nots . 12 Colors and Typography . 13 Primary Brand Colors............................. 14 Secondary / Product Colors . 15 Tertiary Colors .................................. 16 Corporate Font . 17 Alternate Fonts.................................. 18 Corporate Font - Monospace ...................... 19 Corporate Font - Display .......................... 20 pg. 3 ©Cinnafilm Inc. 2018 Logo Overview, Variations & Best Practices Branding & Style Guide 1.1.1 Logo pg. 4 ©Cinnafilm Inc. 2019 Logo: Overview Branding & Style Guide 1.1.1 • The official Cinnafilm logo for all intents and purposes
    [Show full text]
  • Brand Identity at a Glance United Way of Rhode Island
    Brand identity at a glance United Way of Rhode Island Logo suite The components of our brandmark – the rainbow of hope, the hand of Full color support, and the person as a symbol of humanity – communicate the important United Way brand characteristics – caring, inspiring, trustworthy, United Way of Rhode Island and approachable. Note: One color LIVE UNITED is no longer required as a part of the United Way brandmark lockup. Check that the logo you are using includes a ‘Register’ mark [®], not a ‘Trademark’ [TM]. Logo files are available in #TeamUnited > General > Marketing Communications File formats available: .jpg, .png, .eps, and .pdf Special use, one color - Quick reference for which file format to use: for use on merchandise For web/electronic applications, use .jpg or .png files (pixel-based files that can be viewed or signage on any monitor, but cannot be enlarged without losing resolution/quality. For print applications, use .eps or .pdf (vector-based files that can be re-sized without losing resolution/quality. Color palette The United Way color palette is comprised of colors used in the United Way brandmark. In addition, black, grey, and white are included for added flexibility and one-color scenarios. Pantone 287 Pantone 659 Pantone 179 Pantone 143 Black Black 70% White C:100 M:74 Y:0 K:0 C:55 M:40 Y:0 K:0 C:0 M:85 Y:89 K:0 C:0 M:34 Y:86 K:0 C:0 M:0 Y:0 K:100 C:0 M:0 Y:0 K:70 C:0 M:0 Y:0 K:0 R:0 G:81 B:145 R:83 G:158 B:208 R:255 G:68 B:59 R:255 G:179 B:81 R:0 G:0 B:0 R:79 G:79 B:79 R:255 G:255 B:255 HEX: #005191 HEX: #59ED0 HEX: #FF443B HEX: #FFB351 HEX: #000000 HEX: #545454 HEX: #ffffff Typography These typefaces have been selected for the United Way brand identity.
    [Show full text]
  • Deployment Guide
    Deployment Guide Styling the Widgets 9/30/2021 Contents • 1 Styling the Widgets • 1.1 Themes • 1.2 How do I set the active theme? • 1.3 How do I create my own themes? • 1.4 How do I register my themes with Genesys Widgets? • 1.5 How do I change styles for a specific widget? • 1.6 How do I change the layout and structure of widgets? • 1.7 How do I change fonts? Deployment Guide 2 Styling the Widgets Styling the Widgets Themes You can change the appearance of Genesys Widgets using themes. Themes allow you to change colors and fonts for all widgets. Genesys Widgets includes two built-in themes, "dark" and "light". The "dark" theme is active by default. Dark Theme Light Theme Deployment Guide 3 Styling the Widgets How do I set the active theme? There are two methods for setting the active theme: Configuration window._genesys.widgets.main.theme = "light"; // or "dark" Widget Bus Command window._genesys.widgets.bus.command("App.setTheme", {theme: "light"}); // or "dark" How do I create my own themes? Theme Templates Genesys Widgets uses special LESS files called "Theme Templates" to define themes. Using this Theme Template, you can modify the color palette and add new styles. Everything is laid out clearly in the template file. LESS syntax is used because we can define local variables that allow us to create a clear color palette. The LESS file color palette consists of no less than 28 separate color variables. These are grouped by their usage: Deployment Guide 4 Styling the Widgets • Background Colors • Text Colors • Icon Colors • Border Colors • Outline Colors At a bare minimum, you can create a new style by simply changing the color values in the color palette.
    [Show full text]
  • Set Roboto Font Android Xml
    Set roboto font android xml Continue I hear this often nowadays: Roboto is the default type of font. But how do you use this type of font by default? What I am referring to in particular is that in the old days, when I used to download assets, etc., I used to specify such things as roboto_bold/item/roboto_thin roboto_thin_italic roboto_light roboto_light_italic roboto_regular roboto_italic roboto_medium roboto_medium_italic roboto_bold roboto_bold_italic roboto_black roboto_black_italic roboto_condensed_light roboto_condensed_light_italic roboto_condensed_regular roboto_condensed_italic roboto_condensed_bold roboto_condensed_bold_italic roboto_slab_thin roboto_slab_light roboto_slab_regular roboto_slab_bold item? This is for future people working on the same issue as me. Use the following two codes together to actually make it run smoothly. I got a solution from the stackoverflow, but they didn't list the answers together. RobotoTextView Public Class Expands TextView Context - Context; Public context RobotoTextView (Context, AttributeSet attrs, int defStyle) - super (context, attrs, defStyle); this.context - context; - Public invalid setTypeface (Typeface tf, int style) - if (!isInEditMode()) - if (style - Typeface.NORMAL) - super.setTypeface (TypeFaceProvider.getTypeFace (getContext).), backgrounds/Roboto-Light.ttf))) IR) - super.setTypeface (TypeFaceProvider.getTypeFace (getContext); )) - otherwise if (style No Typeface.BOLD_ITALIC) - super.setTypeface (TypeFaceProvider.getTypeFace (getContext),), backgrounds/Roboto-BoldItalic.ttf);;
    [Show full text]