Depending on the .aes file, you might be able to extract a hash from the file and use something like hashcat to bruteforce it, but you'd need to have some idea of what the password you used was (password length, types of characters/numbers/symbols used, random chars or words? etc)
Thanks, I think I have the wallet file itself decrypted with the right password, the same I use for importing the wallet. And I found some random numbers and letters for example walletPrivKey, xPubKey and xPrivKeyEncrypted, which I'd guess at least some of are hashes. I'd think the next step would be trying to brute force these. I tried hashcat as you suggested and even got it working with simple test hashes, but all these different hashes and salts are getting over my head.
