TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA supports forward secrecy, but it doesn't use GCM mode, and uses SHA1.
TLS_RSA_WITH_AES_256_GCM_SHA384 uses GCM mode and uses SHA2, but it doesn't support forward secrecy.
Which one is more secure?
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA supports forward secrecy, but it doesn't use GCM mode, and uses SHA1.
TLS_RSA_WITH_AES_256_GCM_SHA384 uses GCM mode and uses SHA2, but it doesn't support forward secrecy.
Which one is more secure?
Neither cipher suite is good. Which one is the least bad depends on your threat model.
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA has two problems:
TLS_RSA_WITH_AES_256_GCM_SHA384 has two problems:
If you can use both TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA and TLS_RSA_WITH_AES_256_GCM_SHA384, then you have all the cryptographic primitives needed by TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and you should use that. (The AES_128 and GCM_SHA256 variants are also fine: the added security from having more bits there is purely theoretical.)
If you are in the very weird situation that only TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA and TLS_RSA_WITH_AES_256_GCM_SHA384 are available, then it comes down to which attacks concern you and how good client and server implementations are. You have to choose between a potential Lucky Thirteen vulnerability (on either the client or the server), and a potential Bleichenbacher vulnerability (on the server) plus the lack of forward secrecy.
_SHA suite sets SHA1 for HMAC (which is safe), but doesn't control handshake signature in 1.2; that is server's choice constrained only by the signature_algorithms extension (if present, which IME it always is). Plus as you say very little of the data covered by handshake signature is subject to attacker control. I agree with @schroeder, I don't think you can do a direct "which is better?" comparison with cipher suites.
That said, Mozilla's TLS Recommendations currently lists DHE-RSA-AES256-GCM-SHA384 in the INTERMEDIATE list (although right at the bottom), and lists ECDHE-RSA-AES256-SHA in OLD.
So maybe that's your answer? ... neither are great, but at least according to Mozilla, DHE-RSA-AES256-GCM-SHA384 is better.
On the cmd line, try:
$ openssl ciphers | tr ':' '\n' This would give you the list of ciphers in the decreasing order of "strength". This list should help you evaluate the two ciphers in your question.
To attack an implementation vulnerable to variants of POODLE and Lucky13, one of the sides needs to be vulnerable (not a given, e.g. if SChannel is used on both sides it should be secure) and the attack is active, detectable in traffic analysis.
To attack a recording of a connection made using a non-PFS cipher suite, the attacker needs to get access to the private key corresponding to the end-entity (leaf) certificate, potentially years after the certificate has expired and the disk that contained it has been disposed of. This is a safe passive attack (depending on how you get the private key).
Because of this, I think RSA key exchange is worse than CBC cipher suite. But really, you should avoid both - you should allow in TLS1.2 only what is allowed in TLS1.3.