While looking for fresh dropper I found this old(2013) rootkit(2012 variant) version, where you can find combination of cabinet and aplib usage (this should version from April 2013). As you remember sirefef dropped cab usage in the end of 2013 moving to aplib for packing it internal components. In attach you will find dropper (which uses self debugging for decryption), final stage dropper (MSCF inside)
MD5 13f332819853fea68751c27bcb3a3554
SHA1 c72781eb621a372e35ae0d5bf0e8eb9df288b94c
SHA256 a08584146f61cc32cf0107b32503df066fb17ed9e158f810aafaecf5dca20e66
https://www.virustotal.com/en/file/a085 ... /analysis/