In the wild, the malicious BAT was wrapped in the EXE file which pretended to be an Excel document, so the BAT malware was not executed manually by the user. This means, that the malware could also bypass SysHardener protection for BAT files and some SRP configs based on Default Security Level = "Basic User" (the "Disallowed" setting will block it).
It is possible that Kaspersky's proactive protection could block the initial EXE, especially with tweaked Application Control.