Normally, the date timestamp on an executable is meaningless, because the timestamp won't be the original compile time, but instead the installation time. There's no way the executable could depend on an external timestamp to verify if it is intact.
Some executable files are digitally signed. This means that an cryptographic function is applied against the file using the publisher's key, and affixed to the executable. This signature can be verified by the OS (such as Windows), or by the executable itself.
Any changes to the binary structure of the executable will be noticed because the signature won't match the computed value. There's usually no way to generate the correct signature without the original key, which is a security feature that prevents tampering (e.g. to crack software, or a virus infection).
Beyond that, there can also be CRC (e.g. CRC-32) that can simply detect changes to the executable as well. In this case, the executable might be verifying the check internally, which you might be able to bypass by tracing through the executable code until you find the check routine and no-op (0x90) out the function call to the checking function.
If it is a simple issue of time modification, you can use a time stamp editor such as touch. There are many windows equivalents out there. – Sun – 2014-09-15T02:35:28.640