Guys, please, the video can be interpreted in many ways, because we know for sure from it, only that
rundll32.exe was blocked after a successful EternalBlue exploit. So, there are three or more scenarios:
- EternalBlue tried to inject DoublePulsar and failed because the rundll32.exe was used on this stage (Dan).
- EternalBlue successfully injected DoublePulsar, but DoublePulsar failed to run the payload, because the rundll32.exe was used on this stage.
- EternalBlue & DoublePulsar successfully executed the payload, but the payload (or its child process) failed, because the rundll32.exe was used to load additional DLL. (Umbra).
The first two scenarios, would be very strange, because Eternal Blue is Ring 0 -> Ring 0 exploit (operating fully on the Kernel level), and DoublePulsar is a kind of Reflective DLL Loader (does not use rundll32.exe).
So, additional information is required to choose the right scenario. The first point verification, can be done easily by reproducing Dan's video, and performing the test for DoublePulsar on the target machine.
Until the test will be made, the discussion is pointless, and annoying.
It would be also fine if Dan could avoid using the word AG (AppGuard) and Umbra the word VS (VoodooShield).