See Daniel S's more complete answer. I missed the 256 bit key part.
Your best bet would be differential cryptanalysis.
Taking this as "best for the cryptanalyst", the AES Sbox difference distribution table has output differences with probability $4/256=2^{-6}$ for each input difference, including one of weight exactly 1, which is your case.
Continuing on, what needs to be done is essentially the same analysis as a typical differential attack on AES, since the shift rows followed by mix columns will do their job of diffusing the effects.
Such an attack has not been demonstrated that is better than brute force complexity of $2^{128},$ to the best of my knowledge. The plaintext/ciphertext pair requirement will also be essentially as large as $2^{128}$, but I am willing to be proved wrong on this. In any case that won't be much better than $2^{128}$ either.
In a recent question the answer referred to biclique cryptanalysis with complexity better than brute force complexity. Even that attack which is the best known has complexity $2^{127}$ or so, and data requirement (amount of plaintext/ciphertexts) are much less.
So you might as well do a brute force key search with a few plaintext ciphertext pairs.